Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepMalware.15071.2577.exe

Overview

General Information

Sample name:SecuriteInfo.com.FileRepMalware.15071.2577.exe
Analysis ID:1379489
MD5:4fde8f742e26e3b29dfaecd985385ad1
SHA1:cf77208b231c723a598e8a053700523ecbdd4d1d
SHA256:40d6daf0fc26ff5469520993d31e37bcb3c342a3103e2f79a5ddc7322ca84596
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeAvira: detected
Source: http://dotdo.net/chkn.php?n=4528372SSAvira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=2Avira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=26Avira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=4528372pDataAvira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=4Avira URL Cloud: Label: malware
Source: http://dotdo.net/mAvira URL Cloud: Label: malware
Source: http://dotdo.net/Avira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=4528372%R3Avira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=4528372URAvira URL Cloud: Label: malware
Source: http://dotdo.net/chkn.php?n=4528372Avira URL Cloud: Label: malware
Source: dotdo.netVirustotal: Detection: 10%Perma Link
Source: http://dotdo.net/Virustotal: Detection: 10%Perma Link
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeReversingLabs: Detection: 24%
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeVirustotal: Detection: 30%Perma Link
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_00406268 FindFirstFileA,FindClose,0_2_00406268
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_0040572D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040572D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /chkn.php?n=4528372 HTTP/1.1User-Agent: NSIS_Inetc (Mozilla)Host: dotdo.netConnection: Keep-AliveCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: dotdo.net
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991932677.00000000007C7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.00000000007BF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991394447.00000000007C5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.00000000007BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991839207.0000000000768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=2
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991839207.0000000000768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=26
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991839207.0000000000768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=4
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=4528372
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=4528372%R3
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=4528372SS
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=4528372UR
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/chkn.php?n=4528372pData
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.00000000007BF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.00000000007BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dotdo.net/m
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004051CA GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004051CA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004031F1 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031F1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004067420_2_00406742
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_00404A090_2_00404A09
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_00406F190_2_00406F19
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs SecuriteInfo.com.FileRepMalware.15071.2577.exe
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs SecuriteInfo.com.FileRepMalware.15071.2577.exe
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal76.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004031F1 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031F1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_00404496 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404496
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004020CB CoCreateInstance,MultiByteToWideChar,0_2_004020CB
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeFile created: C:\Users\user\Desktop\ok.txtJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeFile created: C:\Users\user\AppData\Local\Temp\nsf63F.tmpJump to behavior
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeReversingLabs: Detection: 24%
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeVirustotal: Detection: 30%
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeFile created: C:\Users\user\AppData\Local\Temp\nsf640.tmp\INetC.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_00406268 FindFirstFileA,FindClose,0_2_00406268
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_0040572D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040572D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991932677.00000000007D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW&
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991932677.00000000007D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeAPI call chain: ExitProcess graph end nodegraph_0-3010
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exeCode function: 0_2_004031F1 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031F1
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management InstrumentationPath Interception1
Access Token Manipulation
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
System Shutdown/Reboot
Acquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Access Token Manipulation
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
Exfiltration Over Bluetooth2
Non-Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Data Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureTraffic Duplication1
Ingress Tool Transfer
Data DestructionVirtual Private ServerEmployee Names
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.FileRepMalware.15071.2577.exe24%ReversingLabsWin32.Adware.RedCap
SecuriteInfo.com.FileRepMalware.15071.2577.exe30%VirustotalBrowse
SecuriteInfo.com.FileRepMalware.15071.2577.exe100%AviraHEUR/AGEN.1345555
SecuriteInfo.com.FileRepMalware.15071.2577.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsf640.tmp\INetC.dll3%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsf640.tmp\INetC.dll1%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
dotdo.net11%VirustotalBrowse
SourceDetectionScannerLabelLink
http://dotdo.net/chkn.php?n=4528372SS100%Avira URL Cloudmalware
http://dotdo.net/chkn.php?n=2100%Avira URL Cloudmalware
http://dotdo.net/chkn.php?n=26100%Avira URL Cloudmalware
http://dotdo.net/chkn.php?n=4528372pData100%Avira URL Cloudmalware
http://dotdo.net/chkn.php?n=4100%Avira URL Cloudmalware
http://dotdo.net/m100%Avira URL Cloudmalware
http://dotdo.net/100%Avira URL Cloudmalware
http://dotdo.net/chkn.php?n=4528372%R3100%Avira URL Cloudmalware
http://dotdo.net/chkn.php?n=4528372UR100%Avira URL Cloudmalware
http://dotdo.net/11%VirustotalBrowse
http://dotdo.net/chkn.php?n=4528372100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
dotdo.net
23.106.59.18
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://dotdo.net/chkn.php?n=4528372false
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://dotdo.net/chkn.php?n=4528372SSSecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://dotdo.net/chkn.php?n=26SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991839207.0000000000768000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://nsis.sf.net/NSIS_ErrorSecuriteInfo.com.FileRepMalware.15071.2577.exefalse
    high
    http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.FileRepMalware.15071.2577.exefalse
      high
      http://dotdo.net/chkn.php?n=2SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991839207.0000000000768000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://dotdo.net/chkn.php?n=4528372pDataSecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://dotdo.net/chkn.php?n=4SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991839207.0000000000768000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://dotdo.net/mSecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.00000000007BF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.00000000007BF000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://dotdo.net/SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991932677.00000000007C7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.00000000007BF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991394447.00000000007C5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.00000000007BF000.00000004.00000020.00020000.00000000.sdmpfalse
      • 11%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://dotdo.net/chkn.php?n=4528372%R3SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      http://dotdo.net/chkn.php?n=4528372URSecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000002.1991885606.000000000079C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.15071.2577.exe, 00000000.00000003.1991326426.000000000079C000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      23.106.59.18
      dotdo.netUnited Kingdom
      205544LEASEWEB-UK-LON-11GBfalse
      Joe Sandbox version:38.0.0 Ammolite
      Analysis ID:1379489
      Start date and time:2024-01-23 13:42:06 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 11s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:2
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.FileRepMalware.15071.2577.exe
      Detection:MAL
      Classification:mal76.winEXE@1/1@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 98%
      • Number of executed functions: 27
      • Number of non-executed functions: 32
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      LEASEWEB-UK-LON-11GB5672D5B80770DEB68BF2435FEF12D521C04CE012250CC.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      F85362FA96806CE4FF93B8A49E0E74F65DEA0B759AE87.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      d47b38d68c7ef6c19add401c1c6defb99aef1fac8fd28.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      d47b38d68c7ef6c19add401c1c6defb99aef1fac8fd28.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      69e6517b2ee056dd1f5f70c46faf6235b84db97a74a65.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      69e6517b2ee056dd1f5f70c46faf6235b84db97a74a65.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      w1J9KDIC0m.exeGet hashmaliciousUnknownBrowse
      • 23.106.59.52
      2646fef76ae933018ff8a48e7c46c4ae6a82176107f7d.exeGet hashmaliciousNetSupport RATBrowse
      • 23.106.59.52
      2646fef76ae933018ff8a48e7c46c4ae6a82176107f7d.exeGet hashmaliciousNetSupport RATBrowse
      • 23.106.59.52
      5dc7e9979eac4e1aef7b7479431445d4397bd53757f23.exeGet hashmaliciousNetSupport RATBrowse
      • 23.106.59.52
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsf640.tmp\INetC.dllPmRXFyOFkf.exeGet hashmaliciousGuLoaderBrowse
        PmRXFyOFkf.exeGet hashmaliciousUnknownBrowse
          SetupFA.exeGet hashmaliciousUnknownBrowse
            https://veryfast.io/downloading.htmlGet hashmaliciousUnknownBrowse
              Setup 2.exeGet hashmaliciousUnknownBrowse
                SetupFA.exeGet hashmaliciousUnknownBrowse
                  Ace_Stream_Media_3.1.32.exeGet hashmaliciousUnknownBrowse
                    KO7UuzwSSQ.exeGet hashmaliciousUnknownBrowse
                      SetupFA.exeGet hashmaliciousUnknownBrowse
                        webExt_DL.exeGet hashmaliciousUnknownBrowse
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):22016
                          Entropy (8bit):5.668346578219837
                          Encrypted:false
                          SSDEEP:384:VpOSdCjDyyvBwRlX+ODbswYM2s74NS0v0Ac9khYLMkIX0+Gzyekx:rdCjW/lX1PfYM2X1
                          MD5:92EC4DD8C0DDD8C4305AE1684AB65FB0
                          SHA1:D850013D582A62E502942F0DD282CC0C29C4310E
                          SHA-256:5520208A33E6409C129B4EA1270771F741D95AFE5B048C2A1E6A2CC2AD829934
                          SHA-512:581351AEF694F2489E1A0977EBCA55C4D7268CA167127CEFB217ED0D2098136C7EB433058469449F75BE82B8E5D484C9E7B6CF0B32535063709272D7810EC651
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 3%
                          • Antivirus: Virustotal, Detection: 1%, Browse
                          Joe Sandbox View:
                          • Filename: PmRXFyOFkf.exe, Detection: malicious, Browse
                          • Filename: PmRXFyOFkf.exe, Detection: malicious, Browse
                          • Filename: SetupFA.exe, Detection: malicious, Browse
                          • Filename: , Detection: malicious, Browse
                          • Filename: Setup 2.exe, Detection: malicious, Browse
                          • Filename: SetupFA.exe, Detection: malicious, Browse
                          • Filename: Ace_Stream_Media_3.1.32.exe, Detection: malicious, Browse
                          • Filename: KO7UuzwSSQ.exe, Detection: malicious, Browse
                          • Filename: SetupFA.exe, Detection: malicious, Browse
                          • Filename: webExt_DL.exe, Detection: malicious, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9<.EXR.EXR.EXR.b.).LXR.EXS..XR.b. .FXR.b.(.DXR.b...DXR.b.*.DXR.RichEXR.................PE..L....I6V...........!.....8...P......Q?.......P...................................................................... G..l....?..d.......(...............................................................................P............................text....7.......8.................. ..`.data...<<...P.......<..............@....rsrc...(............D..............@..@.reloc...............N..............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):6.883932676096237
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:SecuriteInfo.com.FileRepMalware.15071.2577.exe
                          File size:48'620 bytes
                          MD5:4fde8f742e26e3b29dfaecd985385ad1
                          SHA1:cf77208b231c723a598e8a053700523ecbdd4d1d
                          SHA256:40d6daf0fc26ff5469520993d31e37bcb3c342a3103e2f79a5ddc7322ca84596
                          SHA512:1466dbecad6c438c88b4204361723cf3a1ab60095a07ce21546d912142af1c0e365222a11b90b48a70127ecfbdb15dcb5cef4e1ddd53ee38601280b42171d25a
                          SSDEEP:768:Nnnw4xRMjJ8FBDOLQmzPjhAVHx10Z0D3yuInmBd0cJbZod4KRxurgNs3d5xM+Ts5:lnw8RSijDtSA5xeZ0DbBCcJbzRQsN5xI
                          TLSH:A323AD1737A0D8F7D47203B00E7AAB2BEFFA861811956B4B57841F56BD23582462F387
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...z..Y.................d...|.....
                          Icon Hash:3d2e0f95332b3399
                          Entrypoint:0x4031f1
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x597FCC7A [Tue Aug 1 00:34:02 2017 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                          Instruction
                          sub esp, 00000184h
                          push ebx
                          push esi
                          push edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [esp+18h], ebx
                          mov dword ptr [esp+10h], 0040A198h
                          mov dword ptr [esp+20h], ebx
                          mov byte ptr [esp+14h], 00000020h
                          call dword ptr [004080A0h]
                          call dword ptr [0040809Ch]
                          and eax, BFFFFFFFh
                          cmp ax, 00000006h
                          mov dword ptr [0042F40Ch], eax
                          je 00007F5D38FA9A03h
                          push ebx
                          call 00007F5D38FACABAh
                          cmp eax, ebx
                          je 00007F5D38FA99F9h
                          push 00000C00h
                          call eax
                          mov esi, 00408298h
                          push esi
                          call 00007F5D38FACA36h
                          push esi
                          call dword ptr [00408098h]
                          lea esi, dword ptr [esi+eax+01h]
                          cmp byte ptr [esi], bl
                          jne 00007F5D38FA99DDh
                          push 0000000Ah
                          call 00007F5D38FACA8Eh
                          push 00000008h
                          call 00007F5D38FACA87h
                          push 00000006h
                          mov dword ptr [0042F404h], eax
                          call 00007F5D38FACA7Bh
                          cmp eax, ebx
                          je 00007F5D38FA9A01h
                          push 0000001Eh
                          call eax
                          test eax, eax
                          je 00007F5D38FA99F9h
                          or byte ptr [0042F40Fh], 00000040h
                          push ebp
                          call dword ptr [00408044h]
                          push ebx
                          call dword ptr [00408288h]
                          mov dword ptr [0042F4D8h], eax
                          push ebx
                          lea eax, dword ptr [esp+38h]
                          push 00000160h
                          push eax
                          push ebx
                          push 00429830h
                          call dword ptr [00408178h]
                          push 0040A188h
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85340xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f0000xa50.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x62540x6400d550b03059038df9bf82548da8080ff6False0.6676171875data6.4338643172916266IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x13540x14005143a41b917c20afc11d259fd85b6ffcFalse0.4599609375data5.236269898436511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x255180x6004c97d95c0fc95b712d16eb7b0ee5a871False0.4557291666666667data4.044625496015545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x300000xf0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x3f0000xa500xc005bfda947161c3b71f20623138f0170d9False0.40234375data4.187622894680572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x3f1900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                          RT_DIALOG0x3f4780x100dataEnglishUnited States0.5234375
                          RT_DIALOG0x3f5780x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0x3f6980x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0x3f6f80x14dataEnglishUnited States1.2
                          RT_MANIFEST0x3f7100x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                          DLLImport
                          KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                          USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                          SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                          ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 23, 2024 13:42:55.179413080 CET4970580192.168.2.523.106.59.18
                          Jan 23, 2024 13:42:55.381151915 CET804970523.106.59.18192.168.2.5
                          Jan 23, 2024 13:42:55.381269932 CET4970580192.168.2.523.106.59.18
                          Jan 23, 2024 13:42:55.381587029 CET4970580192.168.2.523.106.59.18
                          Jan 23, 2024 13:42:55.600811958 CET804970523.106.59.18192.168.2.5
                          Jan 23, 2024 13:42:55.601082087 CET4970580192.168.2.523.106.59.18
                          Jan 23, 2024 13:42:55.706619024 CET4970580192.168.2.523.106.59.18
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 23, 2024 13:42:54.974947929 CET5089353192.168.2.51.1.1.1
                          Jan 23, 2024 13:42:55.151702881 CET53508931.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 23, 2024 13:42:54.974947929 CET192.168.2.51.1.1.10x45a3Standard query (0)dotdo.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 23, 2024 13:42:55.151702881 CET1.1.1.1192.168.2.50x45a3No error (0)dotdo.net23.106.59.18A (IP address)IN (0x0001)false
                          • dotdo.net
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.54970523.106.59.18807088C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe
                          TimestampBytes transferredDirectionData
                          Jan 23, 2024 13:42:55.381587029 CET136OUTGET /chkn.php?n=4528372 HTTP/1.1
                          User-Agent: NSIS_Inetc (Mozilla)
                          Host: dotdo.net
                          Connection: Keep-Alive
                          Cache-Control: no-cache
                          Jan 23, 2024 13:42:55.600811958 CET254INHTTP/1.1 200 OK
                          Date: Tue, 23 Jan 2024 12:42:53 GMT
                          Server: Apache/2.2.22 (Win64) mod_ssl/2.2.22 OpenSSL/1.0.1c PHP/5.3.13
                          X-Powered-By: PHP/5.3.13
                          Content-Length: 0
                          Keep-Alive: timeout=5, max=100
                          Connection: Keep-Alive
                          Content-Type: text/html


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:13:42:53
                          Start date:23/01/2024
                          Path:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe
                          Imagebase:0x400000
                          File size:48'620 bytes
                          MD5 hash:4FDE8F742E26E3B29DFAECD985385AD1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:17.4%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:21.2%
                            Total number of Nodes:1269
                            Total number of Limit Nodes:31
                            execution_graph 3411 4025c4 3412 402a9f 17 API calls 3411->3412 3413 4025ce 3412->3413 3414 405b76 ReadFile 3413->3414 3415 40263e 3413->3415 3416 40264e 3413->3416 3419 40263c 3413->3419 3414->3413 3420 405ec3 wsprintfA 3415->3420 3418 402664 SetFilePointer 3416->3418 3416->3419 3418->3419 3420->3419 3421 402245 3422 402ac1 17 API calls 3421->3422 3423 40224b 3422->3423 3424 402ac1 17 API calls 3423->3424 3425 402254 3424->3425 3426 402ac1 17 API calls 3425->3426 3427 40225d 3426->3427 3428 406268 2 API calls 3427->3428 3429 402266 3428->3429 3430 402277 lstrlenA lstrlenA 3429->3430 3435 40226a 3429->3435 3432 40508c 24 API calls 3430->3432 3431 40508c 24 API calls 3434 402272 3431->3434 3433 4022b3 SHFileOperationA 3432->3433 3433->3434 3433->3435 3435->3431 3436 4028c5 3437 402a9f 17 API calls 3436->3437 3438 4028cb 3437->3438 3439 402900 3438->3439 3440 4028dd 3438->3440 3441 402716 3438->3441 3439->3441 3442 405f87 17 API calls 3439->3442 3440->3441 3444 405ec3 wsprintfA 3440->3444 3442->3441 3444->3441 3277 401746 3278 402ac1 17 API calls 3277->3278 3279 40174d 3278->3279 3280 405b2d 2 API calls 3279->3280 3281 401754 3280->3281 3282 405b2d 2 API calls 3281->3282 3282->3281 3445 401947 3446 402ac1 17 API calls 3445->3446 3447 40194e lstrlenA 3446->3447 3448 402577 3447->3448 3449 4022c7 3450 4022ce 3449->3450 3454 4022e1 3449->3454 3451 405f87 17 API calls 3450->3451 3452 4022db 3451->3452 3453 405681 MessageBoxIndirectA 3452->3453 3453->3454 3455 4051ca 3456 405375 3455->3456 3457 4051ec GetDlgItem GetDlgItem GetDlgItem 3455->3457 3459 4053a5 3456->3459 3460 40537d GetDlgItem CreateThread CloseHandle 3456->3460 3500 40405b SendMessageA 3457->3500 3462 4053d3 3459->3462 3463 4053f4 3459->3463 3464 4053bb ShowWindow ShowWindow 3459->3464 3460->3459 3461 40525c 3469 405263 GetClientRect GetSystemMetrics SendMessageA SendMessageA 3461->3469 3466 4053e3 3462->3466 3467 405407 ShowWindow 3462->3467 3470 40542e 3462->3470 3509 40408d 3463->3509 3505 40405b SendMessageA 3464->3505 3506 403fff 3466->3506 3474 405427 3467->3474 3475 405419 3467->3475 3476 4052d1 3469->3476 3477 4052b5 SendMessageA SendMessageA 3469->3477 3470->3463 3471 40543b SendMessageA 3470->3471 3473 405400 3471->3473 3478 405454 CreatePopupMenu 3471->3478 3482 403fff SendMessageA 3474->3482 3481 40508c 24 API calls 3475->3481 3479 4052e4 3476->3479 3480 4052d6 SendMessageA 3476->3480 3477->3476 3483 405f87 17 API calls 3478->3483 3501 404026 3479->3501 3480->3479 3481->3474 3482->3470 3485 405464 AppendMenuA 3483->3485 3487 405482 GetWindowRect 3485->3487 3488 405495 TrackPopupMenu 3485->3488 3486 4052f4 3489 405331 GetDlgItem SendMessageA 3486->3489 3490 4052fd ShowWindow 3486->3490 3487->3488 3488->3473 3491 4054b1 3488->3491 3489->3473 3493 405358 SendMessageA SendMessageA 3489->3493 3492 405313 ShowWindow 3490->3492 3495 405320 3490->3495 3494 4054d0 SendMessageA 3491->3494 3492->3495 3493->3473 3494->3494 3496 4054ed OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3494->3496 3504 40405b SendMessageA 3495->3504 3498 40550f SendMessageA 3496->3498 3498->3498 3499 405531 GlobalUnlock SetClipboardData CloseClipboard 3498->3499 3499->3473 3500->3461 3502 405f87 17 API calls 3501->3502 3503 404031 SetDlgItemTextA 3502->3503 3503->3486 3504->3489 3505->3462 3507 404006 3506->3507 3508 40400c SendMessageA 3506->3508 3507->3508 3508->3463 3510 4040a5 GetWindowLongA 3509->3510 3520 40412e 3509->3520 3511 4040b6 3510->3511 3510->3520 3512 4040c5 GetSysColor 3511->3512 3513 4040c8 3511->3513 3512->3513 3514 4040d8 SetBkMode 3513->3514 3515 4040ce SetTextColor 3513->3515 3516 4040f0 GetSysColor 3514->3516 3517 4040f6 3514->3517 3515->3514 3516->3517 3518 404107 3517->3518 3519 4040fd SetBkColor 3517->3519 3518->3520 3521 404121 CreateBrushIndirect 3518->3521 3522 40411a DeleteObject 3518->3522 3519->3518 3520->3473 3521->3520 3522->3521 3526 4020cb 3527 402ac1 17 API calls 3526->3527 3528 4020d2 3527->3528 3529 402ac1 17 API calls 3528->3529 3530 4020dc 3529->3530 3531 402ac1 17 API calls 3530->3531 3532 4020e6 3531->3532 3533 402ac1 17 API calls 3532->3533 3534 4020f0 3533->3534 3535 402ac1 17 API calls 3534->3535 3536 4020fa 3535->3536 3537 40213c CoCreateInstance 3536->3537 3538 402ac1 17 API calls 3536->3538 3541 40215b 3537->3541 3543 402206 3537->3543 3538->3537 3539 401423 24 API calls 3540 40223c 3539->3540 3542 4021e6 MultiByteToWideChar 3541->3542 3541->3543 3542->3543 3543->3539 3543->3540 3544 4026ce 3545 4026d4 3544->3545 3546 4026d8 FindNextFileA 3545->3546 3549 4026ea 3545->3549 3547 402729 3546->3547 3546->3549 3550 405f65 lstrcpynA 3547->3550 3550->3549 3551 40444f 3552 404485 3551->3552 3553 40445f 3551->3553 3555 40408d 8 API calls 3552->3555 3554 404026 18 API calls 3553->3554 3556 40446c SetDlgItemTextA 3554->3556 3557 404491 3555->3557 3556->3552 3558 4023d0 3559 402ac1 17 API calls 3558->3559 3560 4023e2 3559->3560 3561 402ac1 17 API calls 3560->3561 3562 4023ec 3561->3562 3575 402b51 3562->3575 3565 402716 3566 402421 3568 40242d 3566->3568 3569 402a9f 17 API calls 3566->3569 3567 402ac1 17 API calls 3571 40241a lstrlenA 3567->3571 3570 40244c RegSetValueExA 3568->3570 3572 402f81 31 API calls 3568->3572 3569->3568 3573 402462 RegCloseKey 3570->3573 3571->3566 3572->3570 3573->3565 3576 402b6c 3575->3576 3579 405e19 3576->3579 3580 405e28 3579->3580 3581 405e33 RegCreateKeyExA 3580->3581 3582 4023fc 3580->3582 3581->3582 3582->3565 3582->3566 3582->3567 3583 403b52 3584 403ca5 3583->3584 3585 403b6a 3583->3585 3587 403cb6 GetDlgItem GetDlgItem 3584->3587 3596 403cf6 3584->3596 3585->3584 3586 403b76 3585->3586 3588 403b81 SetWindowPos 3586->3588 3589 403b94 3586->3589 3590 404026 18 API calls 3587->3590 3588->3589 3593 403bb1 3589->3593 3594 403b99 ShowWindow 3589->3594 3595 403ce0 SetClassLongA 3590->3595 3591 403d50 3592 404072 SendMessageA 3591->3592 3601 403ca0 3591->3601 3642 403d62 3592->3642 3597 403bd3 3593->3597 3598 403bb9 DestroyWindow 3593->3598 3594->3593 3599 40140b 2 API calls 3595->3599 3596->3591 3600 401389 2 API calls 3596->3600 3603 403bd8 SetWindowLongA 3597->3603 3604 403be9 3597->3604 3602 403faf 3598->3602 3599->3596 3605 403d28 3600->3605 3602->3601 3612 403fe0 ShowWindow 3602->3612 3603->3601 3609 403c60 3604->3609 3610 403bf5 GetDlgItem 3604->3610 3605->3591 3606 403d2c SendMessageA 3605->3606 3606->3601 3607 40140b 2 API calls 3607->3642 3608 403fb1 DestroyWindow EndDialog 3608->3602 3611 40408d 8 API calls 3609->3611 3613 403c25 3610->3613 3614 403c08 SendMessageA IsWindowEnabled 3610->3614 3611->3601 3612->3601 3616 403c32 3613->3616 3617 403c79 SendMessageA 3613->3617 3618 403c45 3613->3618 3625 403c2a 3613->3625 3614->3601 3614->3613 3615 405f87 17 API calls 3615->3642 3616->3617 3616->3625 3617->3609 3621 403c62 3618->3621 3622 403c4d 3618->3622 3619 403fff SendMessageA 3619->3609 3620 404026 18 API calls 3620->3642 3624 40140b 2 API calls 3621->3624 3623 40140b 2 API calls 3622->3623 3623->3625 3624->3625 3625->3609 3625->3619 3626 404026 18 API calls 3627 403ddd GetDlgItem 3626->3627 3628 403df2 3627->3628 3629 403dfa ShowWindow EnableWindow 3627->3629 3628->3629 3652 404048 EnableWindow 3629->3652 3631 403e24 EnableWindow 3636 403e38 3631->3636 3632 403e3d GetSystemMenu EnableMenuItem SendMessageA 3633 403e6d SendMessageA 3632->3633 3632->3636 3633->3636 3635 403b33 18 API calls 3635->3636 3636->3632 3636->3635 3653 40405b SendMessageA 3636->3653 3654 405f65 lstrcpynA 3636->3654 3638 403e9c lstrlenA 3639 405f87 17 API calls 3638->3639 3640 403ead SetWindowTextA 3639->3640 3641 401389 2 API calls 3640->3641 3641->3642 3642->3601 3642->3607 3642->3608 3642->3615 3642->3620 3642->3626 3643 403ef1 DestroyWindow 3642->3643 3643->3602 3644 403f0b CreateDialogParamA 3643->3644 3644->3602 3645 403f3e 3644->3645 3646 404026 18 API calls 3645->3646 3647 403f49 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3646->3647 3648 401389 2 API calls 3647->3648 3649 403f8f 3648->3649 3649->3601 3650 403f97 ShowWindow 3649->3650 3651 404072 SendMessageA 3650->3651 3651->3602 3652->3631 3653->3636 3654->3638 3655 401cd4 3656 402a9f 17 API calls 3655->3656 3657 401cda IsWindow 3656->3657 3658 401a0e 3657->3658 3659 4014d6 3660 402a9f 17 API calls 3659->3660 3661 4014dc Sleep 3660->3661 3663 402951 3661->3663 3283 401759 3284 402ac1 17 API calls 3283->3284 3285 401760 3284->3285 3286 401786 3285->3286 3287 40177e 3285->3287 3323 405f65 lstrcpynA 3286->3323 3322 405f65 lstrcpynA 3287->3322 3290 401791 3292 4058fd 3 API calls 3290->3292 3291 401784 3294 4061cf 5 API calls 3291->3294 3293 401797 lstrcatA 3292->3293 3293->3291 3311 4017a3 3294->3311 3295 406268 2 API calls 3295->3311 3296 405ad9 2 API calls 3296->3311 3298 4017ba CompareFileTime 3298->3311 3299 40187e 3300 40508c 24 API calls 3299->3300 3303 401888 3300->3303 3301 40508c 24 API calls 3304 40186a 3301->3304 3302 405f65 lstrcpynA 3302->3311 3305 402f81 31 API calls 3303->3305 3306 40189b 3305->3306 3307 4018af SetFileTime 3306->3307 3309 4018c1 FindCloseChangeNotification 3306->3309 3307->3309 3308 405f87 17 API calls 3308->3311 3309->3304 3310 4018d2 3309->3310 3312 4018d7 3310->3312 3313 4018ea 3310->3313 3311->3295 3311->3296 3311->3298 3311->3299 3311->3302 3311->3308 3318 405681 MessageBoxIndirectA 3311->3318 3319 401855 3311->3319 3321 405afe GetFileAttributesA CreateFileA 3311->3321 3314 405f87 17 API calls 3312->3314 3315 405f87 17 API calls 3313->3315 3316 4018df lstrcatA 3314->3316 3317 4018f2 3315->3317 3316->3317 3320 405681 MessageBoxIndirectA 3317->3320 3318->3311 3319->3301 3319->3304 3320->3304 3321->3311 3322->3291 3323->3290 3664 401659 3665 402ac1 17 API calls 3664->3665 3666 40165f 3665->3666 3667 406268 2 API calls 3666->3667 3668 401665 3667->3668 3669 401959 3670 402a9f 17 API calls 3669->3670 3671 401960 3670->3671 3672 402a9f 17 API calls 3671->3672 3673 40196d 3672->3673 3674 402ac1 17 API calls 3673->3674 3675 401984 lstrlenA 3674->3675 3676 401994 3675->3676 3677 4019d4 3676->3677 3681 405f65 lstrcpynA 3676->3681 3679 4019c4 3679->3677 3680 4019c9 lstrlenA 3679->3680 3680->3677 3681->3679 3328 4036db 3329 4036f3 3328->3329 3330 4036e5 CloseHandle 3328->3330 3335 403720 3329->3335 3330->3329 3333 40572d 67 API calls 3334 403704 3333->3334 3336 40372e 3335->3336 3337 4036f8 3336->3337 3338 403733 FreeLibrary GlobalFree 3336->3338 3337->3333 3338->3337 3338->3338 3682 401f5b 3683 402ac1 17 API calls 3682->3683 3684 401f62 3683->3684 3685 4062fd 5 API calls 3684->3685 3686 401f71 3685->3686 3687 401ff1 3686->3687 3688 401f89 GlobalAlloc 3686->3688 3688->3687 3689 401f9d 3688->3689 3690 4062fd 5 API calls 3689->3690 3691 401fa4 3690->3691 3692 4062fd 5 API calls 3691->3692 3693 401fae 3692->3693 3693->3687 3697 405ec3 wsprintfA 3693->3697 3695 401fe5 3698 405ec3 wsprintfA 3695->3698 3697->3695 3698->3687 3699 40255b 3700 402ac1 17 API calls 3699->3700 3701 402562 3700->3701 3704 405afe GetFileAttributesA CreateFileA 3701->3704 3703 40256e 3704->3703 3705 401a5e 3706 402a9f 17 API calls 3705->3706 3707 401a64 3706->3707 3708 402a9f 17 API calls 3707->3708 3709 401a0e 3708->3709 3397 4024df 3398 402b01 17 API calls 3397->3398 3399 4024e9 3398->3399 3408 402a9f 3399->3408 3401 4024f2 3402 402519 RegEnumValueA 3401->3402 3403 40250d RegEnumKeyA 3401->3403 3405 402716 3401->3405 3404 40252e 3402->3404 3406 402535 RegCloseKey 3402->3406 3403->3406 3404->3406 3406->3405 3409 405f87 17 API calls 3408->3409 3410 402ab4 3409->3410 3410->3401 3710 402c61 3711 402c70 SetTimer 3710->3711 3712 402c89 3710->3712 3711->3712 3713 402cde 3712->3713 3714 402ca3 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3712->3714 3714->3713 3715 401563 3716 4028f9 3715->3716 3719 405ec3 wsprintfA 3716->3719 3718 4028fe 3719->3718 3720 4047e7 3721 404813 3720->3721 3722 4047f7 3720->3722 3724 404846 3721->3724 3725 404819 SHGetPathFromIDListA 3721->3725 3731 405665 GetDlgItemTextA 3722->3731 3727 404830 SendMessageA 3725->3727 3728 404829 3725->3728 3726 404804 SendMessageA 3726->3721 3727->3724 3729 40140b 2 API calls 3728->3729 3729->3727 3731->3726 3732 40166a 3733 402ac1 17 API calls 3732->3733 3734 401671 3733->3734 3735 402ac1 17 API calls 3734->3735 3736 40167a 3735->3736 3737 402ac1 17 API calls 3736->3737 3738 401683 MoveFileA 3737->3738 3739 401696 3738->3739 3740 40168f 3738->3740 3742 406268 2 API calls 3739->3742 3744 40223c 3739->3744 3741 401423 24 API calls 3740->3741 3741->3744 3743 4016a5 3742->3743 3743->3744 3745 405d44 36 API calls 3743->3745 3745->3740 3362 40246d 3373 402b01 3362->3373 3365 402ac1 17 API calls 3366 402480 3365->3366 3367 40248a RegQueryValueExA 3366->3367 3370 402716 3366->3370 3368 4024b0 RegCloseKey 3367->3368 3369 4024aa 3367->3369 3368->3370 3369->3368 3378 405ec3 wsprintfA 3369->3378 3374 402ac1 17 API calls 3373->3374 3375 402b18 3374->3375 3376 405deb RegOpenKeyExA 3375->3376 3377 402477 3376->3377 3377->3365 3378->3368 3746 4019ed 3747 402ac1 17 API calls 3746->3747 3748 4019f4 3747->3748 3749 402ac1 17 API calls 3748->3749 3750 4019fd 3749->3750 3751 401a04 lstrcmpiA 3750->3751 3752 401a16 lstrcmpA 3750->3752 3753 401a0a 3751->3753 3752->3753 3754 40416f 3755 404185 3754->3755 3758 404291 3754->3758 3760 404026 18 API calls 3755->3760 3756 404300 3757 40430a GetDlgItem 3756->3757 3759 4043ca 3756->3759 3762 404320 3757->3762 3763 404388 3757->3763 3758->3756 3758->3759 3766 4042d5 GetDlgItem SendMessageA 3758->3766 3765 40408d 8 API calls 3759->3765 3761 4041db 3760->3761 3764 404026 18 API calls 3761->3764 3762->3763 3769 404346 SendMessageA LoadCursorA SetCursor 3762->3769 3763->3759 3770 40439a 3763->3770 3767 4041e8 CheckDlgButton 3764->3767 3768 4043c5 3765->3768 3787 404048 EnableWindow 3766->3787 3785 404048 EnableWindow 3767->3785 3791 404413 3769->3791 3774 4043a0 SendMessageA 3770->3774 3775 4043b1 3770->3775 3774->3775 3775->3768 3780 4043b7 SendMessageA 3775->3780 3776 4042fb 3788 4043ef 3776->3788 3778 404206 GetDlgItem 3786 40405b SendMessageA 3778->3786 3780->3768 3782 40421c SendMessageA 3783 404243 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3782->3783 3784 40423a GetSysColor 3782->3784 3783->3768 3784->3783 3785->3778 3786->3782 3787->3776 3789 404402 SendMessageA 3788->3789 3790 4043fd 3788->3790 3789->3756 3790->3789 3794 405647 ShellExecuteExA 3791->3794 3793 404379 LoadCursorA SetCursor 3793->3763 3794->3793 3795 40156f 3796 401586 3795->3796 3797 40157f ShowWindow 3795->3797 3798 402951 3796->3798 3799 401594 ShowWindow 3796->3799 3797->3796 3799->3798 2790 4031f1 SetErrorMode GetVersion 2791 403232 2790->2791 2792 403238 2790->2792 2793 4062fd 5 API calls 2791->2793 2881 40628f GetSystemDirectoryA 2792->2881 2793->2792 2795 40324e lstrlenA 2795->2792 2796 40325d 2795->2796 2884 4062fd GetModuleHandleA 2796->2884 2799 4062fd 5 API calls 2800 40326b 2799->2800 2801 4062fd 5 API calls 2800->2801 2802 403277 #17 OleInitialize SHGetFileInfoA 2801->2802 2890 405f65 lstrcpynA 2802->2890 2805 4032c3 GetCommandLineA 2891 405f65 lstrcpynA 2805->2891 2807 4032d5 GetModuleHandleA 2808 4032ec 2807->2808 2892 405928 2808->2892 2811 4033da 2812 4033ed GetTempPathA 2811->2812 2896 4031c0 2812->2896 2814 403405 2817 403409 GetWindowsDirectoryA lstrcatA 2814->2817 2818 40345f DeleteFileA 2814->2818 2815 405928 CharNextA 2816 403310 2815->2816 2816->2811 2816->2815 2821 4033dc 2816->2821 2820 4031c0 12 API calls 2817->2820 2906 402d48 GetTickCount GetModuleFileNameA 2818->2906 2823 403425 2820->2823 2991 405f65 lstrcpynA 2821->2991 2822 403473 2824 40350d ExitProcess OleUninitialize 2822->2824 2832 405928 CharNextA 2822->2832 2863 4034f9 2822->2863 2823->2818 2826 403429 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 2823->2826 2828 403641 2824->2828 2829 403523 2824->2829 2827 4031c0 12 API calls 2826->2827 2830 403457 2827->2830 2834 4036c3 ExitProcess 2828->2834 2835 403649 GetCurrentProcess OpenProcessToken 2828->2835 3008 405681 2829->3008 2830->2818 2830->2824 2842 40348e 2832->2842 2839 403694 2835->2839 2840 403664 LookupPrivilegeValueA AdjustTokenPrivileges 2835->2840 2841 4062fd 5 API calls 2839->2841 2840->2839 2843 40369b 2841->2843 2844 4034d4 2842->2844 2845 403539 2842->2845 2846 4036b0 ExitWindowsEx 2843->2846 2849 4036bc 2843->2849 2992 4059eb 2844->2992 3012 4055ec 2845->3012 2846->2834 2846->2849 3049 40140b 2849->3049 2853 40355a lstrcatA lstrcmpiA 2853->2824 2856 403576 2853->2856 2854 40354f lstrcatA 2854->2853 2858 403582 2856->2858 2859 40357b 2856->2859 2857 4034ee 3007 405f65 lstrcpynA 2857->3007 3020 4055cf CreateDirectoryA 2858->3020 3015 405552 CreateDirectoryA 2859->3015 2934 4037b5 2863->2934 2865 403587 SetCurrentDirectoryA 2866 4035a1 2865->2866 2867 403596 2865->2867 3024 405f65 lstrcpynA 2866->3024 3023 405f65 lstrcpynA 2867->3023 2872 4035ed CopyFileA 2878 4035af 2872->2878 2873 403635 2875 405d44 36 API calls 2873->2875 2876 40363c 2875->2876 2876->2824 2877 405f87 17 API calls 2877->2878 2878->2873 2878->2877 2880 403621 CloseHandle 2878->2880 3025 405f87 2878->3025 3042 405d44 MoveFileExA 2878->3042 3046 405604 CreateProcessA 2878->3046 2880->2878 2882 4062b1 wsprintfA LoadLibraryExA 2881->2882 2882->2795 2885 406323 GetProcAddress 2884->2885 2886 406319 2884->2886 2889 403264 2885->2889 2887 40628f 3 API calls 2886->2887 2888 40631f 2887->2888 2888->2885 2888->2889 2889->2799 2890->2805 2891->2807 2893 40592e 2892->2893 2894 403300 CharNextA 2893->2894 2895 405934 CharNextA 2893->2895 2894->2816 2895->2893 3052 4061cf 2896->3052 2898 4031d6 2898->2814 2899 4031cc 2899->2898 3061 4058fd lstrlenA CharPrevA 2899->3061 2902 4055cf 2 API calls 2903 4031e4 2902->2903 3064 405b2d 2903->3064 3068 405afe GetFileAttributesA CreateFileA 2906->3068 2908 402d88 2929 402d98 2908->2929 3069 405f65 lstrcpynA 2908->3069 2910 402dae 3070 405944 lstrlenA 2910->3070 2914 402dbf GetFileSize 2915 402ebb 2914->2915 2927 402dd6 2914->2927 3075 402ce4 2915->3075 2917 402ec4 2919 402ef4 GlobalAlloc 2917->2919 2917->2929 3110 4031a9 SetFilePointer 2917->3110 3086 4031a9 SetFilePointer 2919->3086 2921 402f27 2925 402ce4 6 API calls 2921->2925 2923 402edd 2926 403193 ReadFile 2923->2926 2924 402f0f 3087 402f81 2924->3087 2925->2929 2930 402ee8 2926->2930 2927->2915 2927->2921 2927->2929 2931 402ce4 6 API calls 2927->2931 3107 403193 2927->3107 2929->2822 2930->2919 2930->2929 2931->2927 2932 402f1b 2932->2929 2932->2932 2933 402f58 SetFilePointer 2932->2933 2933->2929 2935 4062fd 5 API calls 2934->2935 2936 4037c9 2935->2936 2937 4037e1 2936->2937 2938 4037cf GetUserDefaultUILanguage 2936->2938 3140 405e4c 2937->3140 3131 405ec3 wsprintfA 2938->3131 2941 4037df 3132 403a7a 2941->3132 2943 40382a lstrcatA 2943->2941 2944 405e4c 3 API calls 2944->2943 2947 4059eb 18 API calls 2948 40385c 2947->2948 2949 4038e5 2948->2949 2951 405e4c 3 API calls 2948->2951 2950 4059eb 18 API calls 2949->2950 2952 4038eb 2950->2952 2953 403888 2951->2953 2954 4038fb LoadImageA 2952->2954 2955 405f87 17 API calls 2952->2955 2953->2949 2958 4038a4 lstrlenA 2953->2958 2961 405928 CharNextA 2953->2961 2956 4039a1 2954->2956 2957 403922 RegisterClassA 2954->2957 2955->2954 2960 40140b 2 API calls 2956->2960 2959 403958 SystemParametersInfoA CreateWindowExA 2957->2959 2962 403509 2957->2962 2963 4038b2 lstrcmpiA 2958->2963 2964 4038d8 2958->2964 2959->2956 2965 4039a7 2960->2965 2967 4038a2 2961->2967 2962->2824 2963->2964 2968 4038c2 GetFileAttributesA 2963->2968 2966 4058fd 3 API calls 2964->2966 2965->2962 2969 403a7a 18 API calls 2965->2969 2970 4038de 2966->2970 2967->2958 2971 4038ce 2968->2971 2972 4039b8 2969->2972 3145 405f65 lstrcpynA 2970->3145 2971->2964 2974 405944 2 API calls 2971->2974 2975 4039c4 ShowWindow 2972->2975 2976 403a47 2972->2976 2974->2964 2978 40628f 3 API calls 2975->2978 3146 40515e OleInitialize 2976->3146 2980 4039dc 2978->2980 2979 403a4d 2981 403a51 2979->2981 2982 403a69 2979->2982 2983 4039ea GetClassInfoA 2980->2983 2985 40628f 3 API calls 2980->2985 2981->2962 2988 40140b 2 API calls 2981->2988 2984 40140b 2 API calls 2982->2984 2986 403a14 DialogBoxParamA 2983->2986 2987 4039fe GetClassInfoA RegisterClassA 2983->2987 2984->2962 2985->2983 2989 40140b 2 API calls 2986->2989 2987->2986 2988->2962 2990 403a3c 2989->2990 2990->2962 2991->2812 3168 405f65 lstrcpynA 2992->3168 2994 4059fc 3169 405996 CharNextA CharNextA 2994->3169 2997 4034df 2997->2824 3006 405f65 lstrcpynA 2997->3006 2998 4061cf 5 API calls 3003 405a12 2998->3003 2999 405a3d lstrlenA 3000 405a48 2999->3000 2999->3003 3002 4058fd 3 API calls 3000->3002 3004 405a4d GetFileAttributesA 3002->3004 3003->2997 3003->2999 3005 405944 2 API calls 3003->3005 3175 406268 FindFirstFileA 3003->3175 3004->2997 3005->2999 3006->2857 3007->2863 3009 405696 3008->3009 3010 403531 ExitProcess 3009->3010 3011 4056aa MessageBoxIndirectA 3009->3011 3011->3010 3013 4062fd 5 API calls 3012->3013 3014 40353e lstrcatA 3013->3014 3014->2853 3014->2854 3016 4055a3 GetLastError 3015->3016 3017 403580 3015->3017 3016->3017 3018 4055b2 SetFileSecurityA 3016->3018 3017->2865 3018->3017 3019 4055c8 GetLastError 3018->3019 3019->3017 3021 4055e3 GetLastError 3020->3021 3022 4055df 3020->3022 3021->3022 3022->2865 3023->2866 3024->2878 3026 405f94 3025->3026 3027 4061b6 3026->3027 3030 406190 lstrlenA 3026->3030 3032 405f87 10 API calls 3026->3032 3034 405e4c 3 API calls 3026->3034 3035 4060ac GetSystemDirectoryA 3026->3035 3036 4060bf GetWindowsDirectoryA 3026->3036 3037 4061cf 5 API calls 3026->3037 3038 405f87 10 API calls 3026->3038 3039 406139 lstrcatA 3026->3039 3040 4060f3 SHGetSpecialFolderLocation 3026->3040 3178 405ec3 wsprintfA 3026->3178 3179 405f65 lstrcpynA 3026->3179 3028 4035e0 DeleteFileA 3027->3028 3180 405f65 lstrcpynA 3027->3180 3028->2872 3028->2878 3030->3026 3032->3030 3034->3026 3035->3026 3036->3026 3037->3026 3038->3026 3039->3026 3040->3026 3041 40610b SHGetPathFromIDListA CoTaskMemFree 3040->3041 3041->3026 3043 405d65 3042->3043 3044 405d58 3042->3044 3043->2878 3181 405bd4 3044->3181 3047 405643 3046->3047 3048 405637 CloseHandle 3046->3048 3047->2878 3048->3047 3050 401389 2 API calls 3049->3050 3051 401420 3050->3051 3051->2834 3059 4061db 3052->3059 3053 406243 3054 406247 CharPrevA 3053->3054 3056 406262 3053->3056 3054->3053 3055 406238 CharNextA 3055->3053 3055->3059 3056->2899 3057 405928 CharNextA 3057->3059 3058 406226 CharNextA 3058->3059 3059->3053 3059->3055 3059->3057 3059->3058 3060 406233 CharNextA 3059->3060 3060->3055 3062 4031de 3061->3062 3063 405917 lstrcatA 3061->3063 3062->2902 3063->3062 3065 405b38 GetTickCount GetTempFileNameA 3064->3065 3066 405b65 3065->3066 3067 4031ef 3065->3067 3066->3065 3066->3067 3067->2814 3068->2908 3069->2910 3071 405951 3070->3071 3072 402db4 3071->3072 3073 405956 CharPrevA 3071->3073 3074 405f65 lstrcpynA 3072->3074 3073->3071 3073->3072 3074->2914 3076 402d05 3075->3076 3077 402ced 3075->3077 3078 402d15 GetTickCount 3076->3078 3079 402d0d 3076->3079 3080 402cf6 DestroyWindow 3077->3080 3081 402cfd 3077->3081 3083 402d23 CreateDialogParamA ShowWindow 3078->3083 3084 402d46 3078->3084 3111 406339 3079->3111 3080->3081 3081->2917 3083->3084 3084->2917 3086->2924 3089 402f97 3087->3089 3088 402fc5 3091 403193 ReadFile 3088->3091 3089->3088 3117 4031a9 SetFilePointer 3089->3117 3092 402fd0 3091->3092 3093 402fe2 GetTickCount 3092->3093 3094 40312c 3092->3094 3095 403116 3092->3095 3093->3095 3103 403031 3093->3103 3096 40316e 3094->3096 3099 403130 3094->3099 3095->2932 3098 403193 ReadFile 3096->3098 3097 403193 ReadFile 3097->3103 3098->3095 3099->3095 3100 403193 ReadFile 3099->3100 3101 405ba5 WriteFile 3099->3101 3100->3099 3101->3099 3102 403087 GetTickCount 3102->3103 3103->3095 3103->3097 3103->3102 3104 4030ac MulDiv wsprintfA 3103->3104 3115 405ba5 WriteFile 3103->3115 3118 40508c 3104->3118 3129 405b76 ReadFile 3107->3129 3110->2923 3112 406356 PeekMessageA 3111->3112 3113 402d13 3112->3113 3114 40634c DispatchMessageA 3112->3114 3113->2917 3114->3112 3116 405bc3 3115->3116 3116->3103 3117->3088 3119 4050a7 3118->3119 3128 40514a 3118->3128 3120 4050c4 lstrlenA 3119->3120 3121 405f87 17 API calls 3119->3121 3122 4050d2 lstrlenA 3120->3122 3123 4050ed 3120->3123 3121->3120 3124 4050e4 lstrcatA 3122->3124 3122->3128 3125 405100 3123->3125 3126 4050f3 SetWindowTextA 3123->3126 3124->3123 3127 405106 SendMessageA SendMessageA SendMessageA 3125->3127 3125->3128 3126->3125 3127->3128 3128->3103 3130 4031a6 3129->3130 3130->2927 3131->2941 3133 403a8e 3132->3133 3153 405ec3 wsprintfA 3133->3153 3135 403aff 3154 403b33 3135->3154 3137 40383a 3137->2947 3138 403b04 3138->3137 3139 405f87 17 API calls 3138->3139 3139->3138 3157 405deb 3140->3157 3143 405e80 RegQueryValueExA RegCloseKey 3144 40380c 3143->3144 3144->2943 3144->2944 3145->2949 3161 404072 3146->3161 3148 404072 SendMessageA 3150 4051ba OleUninitialize 3148->3150 3149 405181 3151 4051a8 3149->3151 3164 401389 3149->3164 3150->2979 3151->3148 3153->3135 3155 405f87 17 API calls 3154->3155 3156 403b41 SetWindowTextA 3155->3156 3156->3138 3158 405dfa 3157->3158 3159 405e03 RegOpenKeyExA 3158->3159 3160 405dfe 3158->3160 3159->3160 3160->3143 3160->3144 3162 40408a 3161->3162 3163 40407b SendMessageA 3161->3163 3162->3149 3163->3162 3166 401390 3164->3166 3165 4013fe 3165->3149 3166->3165 3167 4013cb MulDiv SendMessageA 3166->3167 3167->3166 3168->2994 3170 4059b1 3169->3170 3173 4059c1 3169->3173 3171 4059bc CharNextA 3170->3171 3170->3173 3174 4059e1 3171->3174 3172 405928 CharNextA 3172->3173 3173->3172 3173->3174 3174->2997 3174->2998 3176 40627e FindClose 3175->3176 3177 406289 3175->3177 3176->3177 3177->3003 3178->3026 3179->3026 3180->3028 3182 405c20 GetShortPathNameA 3181->3182 3183 405bfa 3181->3183 3185 405c35 3182->3185 3186 405d3f 3182->3186 3208 405afe GetFileAttributesA CreateFileA 3183->3208 3185->3186 3187 405c3d wsprintfA 3185->3187 3186->3043 3189 405f87 17 API calls 3187->3189 3188 405c04 CloseHandle GetShortPathNameA 3188->3186 3190 405c18 3188->3190 3191 405c65 3189->3191 3190->3182 3190->3186 3209 405afe GetFileAttributesA CreateFileA 3191->3209 3193 405c72 3193->3186 3194 405c81 GetFileSize GlobalAlloc 3193->3194 3195 405ca3 3194->3195 3196 405d38 CloseHandle 3194->3196 3197 405b76 ReadFile 3195->3197 3196->3186 3198 405cab 3197->3198 3198->3196 3210 405a63 lstrlenA 3198->3210 3201 405cc2 lstrcpyA 3204 405ce4 3201->3204 3202 405cd6 3203 405a63 4 API calls 3202->3203 3203->3204 3205 405d1b SetFilePointer 3204->3205 3206 405ba5 WriteFile 3205->3206 3207 405d31 GlobalFree 3206->3207 3207->3196 3208->3188 3209->3193 3211 405aa4 lstrlenA 3210->3211 3212 405a7d lstrcmpiA 3211->3212 3213 405aac 3211->3213 3212->3213 3214 405a9b CharNextA 3212->3214 3213->3201 3213->3202 3214->3211 3800 406372 WaitForSingleObject 3801 40638c 3800->3801 3802 40639e GetExitCodeProcess 3801->3802 3803 406339 2 API calls 3801->3803 3804 406393 WaitForSingleObject 3803->3804 3804->3801 3805 403773 3806 40377e 3805->3806 3807 403785 GlobalAlloc 3806->3807 3808 403782 3806->3808 3807->3808 3809 4014f4 SetForegroundWindow 3810 402951 3809->3810 3811 401cf5 3812 402a9f 17 API calls 3811->3812 3813 401cfc 3812->3813 3814 402a9f 17 API calls 3813->3814 3815 401d08 GetDlgItem 3814->3815 3816 402577 3815->3816 3817 4022f6 3818 402304 3817->3818 3819 4022fe 3817->3819 3821 402314 3818->3821 3822 402ac1 17 API calls 3818->3822 3820 402ac1 17 API calls 3819->3820 3820->3818 3823 402ac1 17 API calls 3821->3823 3826 402322 3821->3826 3822->3821 3823->3826 3824 402ac1 17 API calls 3825 40232b WritePrivateProfileStringA 3824->3825 3826->3824 3827 4026f8 3828 402ac1 17 API calls 3827->3828 3829 4026ff FindFirstFileA 3828->3829 3830 402722 3829->3830 3834 402712 3829->3834 3831 402729 3830->3831 3835 405ec3 wsprintfA 3830->3835 3836 405f65 lstrcpynA 3831->3836 3835->3831 3836->3834 3837 40237b 3838 402382 3837->3838 3839 4023ad 3837->3839 3840 402b01 17 API calls 3838->3840 3841 402ac1 17 API calls 3839->3841 3843 402389 3840->3843 3842 4023b4 3841->3842 3848 402b7f 3842->3848 3845 4023c1 3843->3845 3846 402ac1 17 API calls 3843->3846 3847 40239a RegDeleteValueA RegCloseKey 3846->3847 3847->3845 3849 402b95 3848->3849 3851 402bab 3849->3851 3852 402bb4 3849->3852 3851->3845 3853 405deb RegOpenKeyExA 3852->3853 3854 402be2 3853->3854 3855 402c08 RegEnumKeyA 3854->3855 3856 402c1f RegCloseKey 3854->3856 3857 402c40 RegCloseKey 3854->3857 3859 402bb4 6 API calls 3854->3859 3861 402c33 3854->3861 3855->3854 3855->3856 3858 4062fd 5 API calls 3856->3858 3857->3861 3860 402c2f 3858->3860 3859->3854 3860->3861 3862 402c4e RegDeleteKeyA 3860->3862 3861->3851 3862->3861 3379 401ffd 3380 4020bd 3379->3380 3381 40200f 3379->3381 3383 401423 24 API calls 3380->3383 3382 402ac1 17 API calls 3381->3382 3384 402016 3382->3384 3390 40223c 3383->3390 3385 402ac1 17 API calls 3384->3385 3386 40201f 3385->3386 3387 402034 LoadLibraryExA 3386->3387 3388 402027 GetModuleHandleA 3386->3388 3387->3380 3389 402044 GetProcAddress 3387->3389 3388->3387 3388->3389 3391 402090 3389->3391 3392 402053 3389->3392 3393 40508c 24 API calls 3391->3393 3394 401423 24 API calls 3392->3394 3395 402063 3392->3395 3393->3395 3394->3395 3395->3390 3396 4020b1 FreeLibrary 3395->3396 3396->3390 3863 40257d 3864 402582 3863->3864 3865 402596 3863->3865 3866 402a9f 17 API calls 3864->3866 3867 402ac1 17 API calls 3865->3867 3869 40258b 3866->3869 3868 40259d lstrlenA 3867->3868 3868->3869 3870 4025bf 3869->3870 3871 405ba5 WriteFile 3869->3871 3871->3870 3872 4018fd 3873 401934 3872->3873 3874 402ac1 17 API calls 3873->3874 3875 401939 3874->3875 3876 40572d 67 API calls 3875->3876 3877 401942 3876->3877 3878 401000 3879 401037 BeginPaint GetClientRect 3878->3879 3880 40100c DefWindowProcA 3878->3880 3882 4010f3 3879->3882 3885 401179 3880->3885 3883 401073 CreateBrushIndirect FillRect DeleteObject 3882->3883 3884 4010fc 3882->3884 3883->3882 3886 401102 CreateFontIndirectA 3884->3886 3887 401167 EndPaint 3884->3887 3886->3887 3888 401112 6 API calls 3886->3888 3887->3885 3888->3887 3889 405000 3890 405010 3889->3890 3891 405024 3889->3891 3892 405016 3890->3892 3893 40506d 3890->3893 3894 40502c IsWindowVisible 3891->3894 3900 405043 3891->3900 3896 404072 SendMessageA 3892->3896 3895 405072 CallWindowProcA 3893->3895 3894->3893 3897 405039 3894->3897 3898 405020 3895->3898 3896->3898 3902 404957 SendMessageA 3897->3902 3900->3895 3907 4049d7 3900->3907 3903 4049b6 SendMessageA 3902->3903 3904 40497a GetMessagePos ScreenToClient SendMessageA 3902->3904 3906 4049ae 3903->3906 3905 4049b3 3904->3905 3904->3906 3905->3903 3906->3900 3916 405f65 lstrcpynA 3907->3916 3909 4049ea 3917 405ec3 wsprintfA 3909->3917 3911 4049f4 3912 40140b 2 API calls 3911->3912 3913 4049fd 3912->3913 3918 405f65 lstrcpynA 3913->3918 3915 404a04 3915->3893 3916->3909 3917->3911 3918->3915 3919 401900 3920 402ac1 17 API calls 3919->3920 3921 401907 3920->3921 3922 405681 MessageBoxIndirectA 3921->3922 3923 401910 3922->3923 3924 401502 3925 40150a 3924->3925 3927 40151d 3924->3927 3926 402a9f 17 API calls 3925->3926 3926->3927 3928 402682 3929 402689 3928->3929 3930 4028fe 3928->3930 3931 402a9f 17 API calls 3929->3931 3932 402690 3931->3932 3933 40269f SetFilePointer 3932->3933 3933->3930 3934 4026af 3933->3934 3936 405ec3 wsprintfA 3934->3936 3936->3930 3937 401c04 3938 402a9f 17 API calls 3937->3938 3939 401c0b 3938->3939 3940 402a9f 17 API calls 3939->3940 3941 401c18 3940->3941 3942 401c2d 3941->3942 3943 402ac1 17 API calls 3941->3943 3944 402ac1 17 API calls 3942->3944 3948 401c3d 3942->3948 3943->3942 3944->3948 3945 401c94 3947 402ac1 17 API calls 3945->3947 3946 401c48 3949 402a9f 17 API calls 3946->3949 3950 401c99 3947->3950 3948->3945 3948->3946 3951 401c4d 3949->3951 3953 402ac1 17 API calls 3950->3953 3952 402a9f 17 API calls 3951->3952 3954 401c59 3952->3954 3955 401ca2 FindWindowExA 3953->3955 3956 401c84 SendMessageA 3954->3956 3957 401c66 SendMessageTimeoutA 3954->3957 3958 401cc0 3955->3958 3956->3958 3957->3958 3324 401389 3326 401390 3324->3326 3325 4013fe 3326->3325 3327 4013cb MulDiv SendMessageA 3326->3327 3327->3326 3959 404a09 GetDlgItem GetDlgItem 3960 404a5b 7 API calls 3959->3960 3974 404c73 3959->3974 3961 404af1 SendMessageA 3960->3961 3962 404afe DeleteObject 3960->3962 3961->3962 3963 404b07 3962->3963 3965 404b3e 3963->3965 3967 405f87 17 API calls 3963->3967 3964 404d57 3966 404e03 3964->3966 3970 404c66 3964->3970 3976 404db0 SendMessageA 3964->3976 3968 404026 18 API calls 3965->3968 3971 404e15 3966->3971 3972 404e0d SendMessageA 3966->3972 3973 404b20 SendMessageA SendMessageA 3967->3973 3969 404b52 3968->3969 3975 404026 18 API calls 3969->3975 3977 40408d 8 API calls 3970->3977 3983 404e27 ImageList_Destroy 3971->3983 3984 404e2e 3971->3984 3988 404e3e 3971->3988 3972->3971 3973->3963 3974->3964 3979 404957 5 API calls 3974->3979 3991 404ce4 3974->3991 3992 404b60 3975->3992 3976->3970 3981 404dc5 SendMessageA 3976->3981 3982 404ff9 3977->3982 3978 404d49 SendMessageA 3978->3964 3979->3991 3980 404fad 3980->3970 3989 404fbf ShowWindow GetDlgItem ShowWindow 3980->3989 3987 404dd8 3981->3987 3983->3984 3985 404e37 GlobalFree 3984->3985 3984->3988 3985->3988 3986 404c34 GetWindowLongA SetWindowLongA 3990 404c4d 3986->3990 3997 404de9 SendMessageA 3987->3997 3988->3980 4003 4049d7 4 API calls 3988->4003 4004 404e79 3988->4004 3989->3970 3993 404c53 ShowWindow 3990->3993 3994 404c6b 3990->3994 3991->3964 3991->3978 3992->3986 3996 404baf SendMessageA 3992->3996 3998 404c2e 3992->3998 4001 404beb SendMessageA 3992->4001 4002 404bfc SendMessageA 3992->4002 4010 40405b SendMessageA 3993->4010 4011 40405b SendMessageA 3994->4011 3996->3992 3997->3966 3998->3986 3998->3990 3999 404ebd 4005 404f83 InvalidateRect 3999->4005 4009 404f31 SendMessageA SendMessageA 3999->4009 4001->3992 4002->3992 4003->4004 4004->3999 4006 404ea7 SendMessageA 4004->4006 4005->3980 4007 404f99 4005->4007 4006->3999 4012 404912 4007->4012 4009->3999 4010->3970 4011->3974 4015 40484d 4012->4015 4014 404927 4014->3980 4016 404863 4015->4016 4017 405f87 17 API calls 4016->4017 4018 4048c7 4017->4018 4019 405f87 17 API calls 4018->4019 4020 4048d2 4019->4020 4021 405f87 17 API calls 4020->4021 4022 4048e8 lstrlenA wsprintfA SetDlgItemTextA 4021->4022 4022->4014 4023 401490 4024 40508c 24 API calls 4023->4024 4025 401497 4024->4025 4026 401d95 GetDC 4027 402a9f 17 API calls 4026->4027 4028 401da7 GetDeviceCaps MulDiv ReleaseDC 4027->4028 4029 402a9f 17 API calls 4028->4029 4030 401dd8 4029->4030 4031 405f87 17 API calls 4030->4031 4032 401e15 CreateFontIndirectA 4031->4032 4033 402577 4032->4033 4034 404496 4035 4044c2 4034->4035 4036 4044d3 4034->4036 4095 405665 GetDlgItemTextA 4035->4095 4038 4044df GetDlgItem 4036->4038 4043 40453e 4036->4043 4040 4044f3 4038->4040 4039 4044cd 4042 4061cf 5 API calls 4039->4042 4045 404507 SetWindowTextA 4040->4045 4051 405996 4 API calls 4040->4051 4041 404622 4046 4047cc 4041->4046 4097 405665 GetDlgItemTextA 4041->4097 4042->4036 4043->4041 4043->4046 4047 405f87 17 API calls 4043->4047 4049 404026 18 API calls 4045->4049 4050 40408d 8 API calls 4046->4050 4052 4045b2 SHBrowseForFolderA 4047->4052 4048 404652 4053 4059eb 18 API calls 4048->4053 4054 404523 4049->4054 4055 4047e0 4050->4055 4056 4044fd 4051->4056 4052->4041 4057 4045ca CoTaskMemFree 4052->4057 4058 404658 4053->4058 4059 404026 18 API calls 4054->4059 4056->4045 4062 4058fd 3 API calls 4056->4062 4060 4058fd 3 API calls 4057->4060 4098 405f65 lstrcpynA 4058->4098 4061 404531 4059->4061 4063 4045d7 4060->4063 4096 40405b SendMessageA 4061->4096 4062->4045 4066 40460e SetDlgItemTextA 4063->4066 4071 405f87 17 API calls 4063->4071 4066->4041 4067 404537 4069 4062fd 5 API calls 4067->4069 4068 40466f 4070 4062fd 5 API calls 4068->4070 4069->4043 4078 404676 4070->4078 4072 4045f6 lstrcmpiA 4071->4072 4072->4066 4075 404607 lstrcatA 4072->4075 4073 4046b2 4099 405f65 lstrcpynA 4073->4099 4075->4066 4076 4046b9 4077 405996 4 API calls 4076->4077 4079 4046bf GetDiskFreeSpaceA 4077->4079 4078->4073 4081 405944 2 API calls 4078->4081 4083 40470a 4078->4083 4082 4046e3 MulDiv 4079->4082 4079->4083 4081->4078 4082->4083 4084 40477b 4083->4084 4085 404912 20 API calls 4083->4085 4086 40479e 4084->4086 4088 40140b 2 API calls 4084->4088 4087 404768 4085->4087 4100 404048 EnableWindow 4086->4100 4090 40477d SetDlgItemTextA 4087->4090 4091 40476d 4087->4091 4088->4086 4090->4084 4093 40484d 20 API calls 4091->4093 4092 4047ba 4092->4046 4094 4043ef SendMessageA 4092->4094 4093->4084 4094->4046 4095->4039 4096->4067 4097->4048 4098->4068 4099->4076 4100->4092 4101 401d1a 4102 402a9f 17 API calls 4101->4102 4103 401d28 SetWindowLongA 4102->4103 4104 402951 4103->4104 4110 40149d 4111 4022e1 4110->4111 4112 4014ab PostQuitMessage 4110->4112 4112->4111 4113 40159d 4114 402ac1 17 API calls 4113->4114 4115 4015a4 SetFileAttributesA 4114->4115 4116 4015b6 4115->4116 4117 401a1e 4118 402ac1 17 API calls 4117->4118 4119 401a27 ExpandEnvironmentStringsA 4118->4119 4120 401a3b 4119->4120 4122 401a4e 4119->4122 4121 401a40 lstrcmpA 4120->4121 4120->4122 4121->4122 4123 40171f 4124 402ac1 17 API calls 4123->4124 4125 401726 SearchPathA 4124->4125 4126 401741 4125->4126 4127 401e25 4128 402a9f 17 API calls 4127->4128 4129 401e2b 4128->4129 4130 402a9f 17 API calls 4129->4130 4131 401e37 4130->4131 4132 401e43 ShowWindow 4131->4132 4133 401e4e EnableWindow 4131->4133 4134 402951 4132->4134 4133->4134 4135 401f2b 4136 402ac1 17 API calls 4135->4136 4137 401f32 4136->4137 4138 406268 2 API calls 4137->4138 4139 401f38 4138->4139 4141 401f4a 4139->4141 4142 405ec3 wsprintfA 4139->4142 4142->4141 4143 40292c SendMessageA 4144 402951 4143->4144 4145 402946 InvalidateRect 4143->4145 4145->4144 3215 401932 3216 401934 3215->3216 3221 402ac1 3216->3221 3222 402acd 3221->3222 3223 405f87 17 API calls 3222->3223 3224 402aee 3223->3224 3225 401939 3224->3225 3226 4061cf 5 API calls 3224->3226 3227 40572d 3225->3227 3226->3225 3228 4059eb 18 API calls 3227->3228 3229 40574d 3228->3229 3230 405755 DeleteFileA 3229->3230 3231 40576c 3229->3231 3260 401942 3230->3260 3232 40589a 3231->3232 3264 405f65 lstrcpynA 3231->3264 3237 406268 2 API calls 3232->3237 3232->3260 3234 405792 3235 4057a5 3234->3235 3236 405798 lstrcatA 3234->3236 3239 405944 2 API calls 3235->3239 3238 4057ab 3236->3238 3240 4058be 3237->3240 3241 4057b9 lstrcatA 3238->3241 3242 4057c4 lstrlenA FindFirstFileA 3238->3242 3239->3238 3243 4058fd 3 API calls 3240->3243 3240->3260 3241->3242 3242->3232 3251 4057e8 3242->3251 3244 4058c8 3243->3244 3246 4056e5 5 API calls 3244->3246 3245 405928 CharNextA 3245->3251 3247 4058d4 3246->3247 3248 4058d8 3247->3248 3249 4058ee 3247->3249 3255 40508c 24 API calls 3248->3255 3248->3260 3250 40508c 24 API calls 3249->3250 3250->3260 3251->3245 3252 405879 FindNextFileA 3251->3252 3259 40572d 60 API calls 3251->3259 3261 40508c 24 API calls 3251->3261 3262 40508c 24 API calls 3251->3262 3263 405d44 36 API calls 3251->3263 3265 405f65 lstrcpynA 3251->3265 3266 4056e5 3251->3266 3252->3251 3254 405891 FindClose 3252->3254 3254->3232 3256 4058e5 3255->3256 3257 405d44 36 API calls 3256->3257 3257->3260 3259->3251 3261->3252 3262->3251 3263->3251 3264->3234 3265->3251 3274 405ad9 GetFileAttributesA 3266->3274 3269 405700 RemoveDirectoryA 3271 40570e 3269->3271 3270 405708 DeleteFileA 3270->3271 3272 405712 3271->3272 3273 40571e SetFileAttributesA 3271->3273 3272->3251 3273->3272 3275 4056f1 3274->3275 3276 405aeb SetFileAttributesA 3274->3276 3275->3269 3275->3270 3275->3272 3276->3275 4146 4026b4 4147 4026ba 4146->4147 4148 402951 4147->4148 4149 4026c2 FindClose 4147->4149 4149->4148 4150 402736 4151 402ac1 17 API calls 4150->4151 4152 402744 4151->4152 4153 40275a 4152->4153 4154 402ac1 17 API calls 4152->4154 4155 405ad9 2 API calls 4153->4155 4154->4153 4156 402760 4155->4156 4178 405afe GetFileAttributesA CreateFileA 4156->4178 4158 40276d 4159 402816 4158->4159 4160 402779 GlobalAlloc 4158->4160 4163 402831 4159->4163 4164 40281e DeleteFileA 4159->4164 4161 402792 4160->4161 4162 40280d CloseHandle 4160->4162 4179 4031a9 SetFilePointer 4161->4179 4162->4159 4164->4163 4166 402798 4167 403193 ReadFile 4166->4167 4168 4027a1 GlobalAlloc 4167->4168 4169 4027b1 4168->4169 4170 4027eb 4168->4170 4172 402f81 31 API calls 4169->4172 4171 405ba5 WriteFile 4170->4171 4173 4027f7 GlobalFree 4171->4173 4177 4027be 4172->4177 4174 402f81 31 API calls 4173->4174 4176 40280a 4174->4176 4175 4027e2 GlobalFree 4175->4170 4176->4162 4177->4175 4178->4158 4179->4166 4180 402837 4181 402a9f 17 API calls 4180->4181 4182 40283d 4181->4182 4183 402865 4182->4183 4184 40287c 4182->4184 4189 402716 4182->4189 4185 402879 4183->4185 4186 40286a 4183->4186 4187 402896 4184->4187 4188 402886 4184->4188 4195 405ec3 wsprintfA 4185->4195 4194 405f65 lstrcpynA 4186->4194 4191 405f87 17 API calls 4187->4191 4190 402a9f 17 API calls 4188->4190 4190->4189 4191->4189 4194->4189 4195->4189 4196 4014b7 4197 4014bd 4196->4197 4198 401389 2 API calls 4197->4198 4199 4014c5 4198->4199 4200 401b39 4201 402ac1 17 API calls 4200->4201 4202 401b40 4201->4202 4203 402a9f 17 API calls 4202->4203 4204 401b49 wsprintfA 4203->4204 4205 402951 4204->4205 4206 40413a lstrcpynA lstrlenA 4207 40233a 4208 402ac1 17 API calls 4207->4208 4209 40234b 4208->4209 4210 402ac1 17 API calls 4209->4210 4211 402354 4210->4211 4212 402ac1 17 API calls 4211->4212 4213 40235e GetPrivateProfileStringA 4212->4213 3339 4015bb 3340 402ac1 17 API calls 3339->3340 3341 4015c2 3340->3341 3342 405996 4 API calls 3341->3342 3356 4015ca 3342->3356 3343 401624 3345 401652 3343->3345 3346 401629 3343->3346 3344 405928 CharNextA 3344->3356 3348 401423 24 API calls 3345->3348 3358 401423 3346->3358 3354 40164a 3348->3354 3350 4055cf 2 API calls 3350->3356 3352 4055ec 5 API calls 3352->3356 3353 40163b SetCurrentDirectoryA 3353->3354 3355 40160c GetFileAttributesA 3355->3356 3356->3343 3356->3344 3356->3350 3356->3352 3356->3355 3357 405552 4 API calls 3356->3357 3357->3356 3359 40508c 24 API calls 3358->3359 3360 401431 3359->3360 3361 405f65 lstrcpynA 3360->3361 3361->3353 4214 401d3b GetDlgItem GetClientRect 4215 402ac1 17 API calls 4214->4215 4216 401d6b LoadImageA SendMessageA 4215->4216 4217 402951 4216->4217 4218 401d89 DeleteObject 4216->4218 4218->4217 4219 4016bb 4220 402ac1 17 API calls 4219->4220 4221 4016c1 GetFullPathNameA 4220->4221 4222 4016d8 4221->4222 4228 4016f9 4221->4228 4224 406268 2 API calls 4222->4224 4222->4228 4223 40170d GetShortPathNameA 4225 402951 4223->4225 4226 4016e9 4224->4226 4226->4228 4229 405f65 lstrcpynA 4226->4229 4228->4223 4228->4225 4229->4228

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 4031f1-403230 SetErrorMode GetVersion 1 403232-40323a call 4062fd 0->1 2 403243 0->2 1->2 7 40323c 1->7 4 403248-40325b call 40628f lstrlenA 2->4 9 40325d-403279 call 4062fd * 3 4->9 7->2 16 40328a-4032ea #17 OleInitialize SHGetFileInfoA call 405f65 GetCommandLineA call 405f65 GetModuleHandleA 9->16 17 40327b-403281 9->17 24 4032f6-40330b call 405928 CharNextA 16->24 25 4032ec-4032f1 16->25 17->16 21 403283 17->21 21->16 28 4033d0-4033d4 24->28 25->24 29 403310-403313 28->29 30 4033da 28->30 31 403315-403319 29->31 32 40331b-403323 29->32 33 4033ed-403407 GetTempPathA call 4031c0 30->33 31->31 31->32 34 403325-403326 32->34 35 40332b-40332e 32->35 43 403409-403427 GetWindowsDirectoryA lstrcatA call 4031c0 33->43 44 40345f-403479 DeleteFileA call 402d48 33->44 34->35 37 4033c0-4033cd call 405928 35->37 38 403334-403338 35->38 37->28 53 4033cf 37->53 41 403350-40337d 38->41 42 40333a-403340 38->42 49 403390-4033be 41->49 50 40337f-403385 41->50 47 403342-403344 42->47 48 403346 42->48 43->44 61 403429-403459 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031c0 43->61 58 40350d-40351d ExitProcess OleUninitialize 44->58 59 40347f-403485 44->59 47->41 47->48 48->41 49->37 52 4033dc-4033e8 call 405f65 49->52 55 403387-403389 50->55 56 40338b 50->56 52->33 53->28 55->49 55->56 56->49 65 403641-403647 58->65 66 403523-403533 call 405681 ExitProcess 58->66 63 403487-403492 call 405928 59->63 64 4034fd-403504 call 4037b5 59->64 61->44 61->58 81 403494-4034bd 63->81 82 4034c8-4034d2 63->82 73 403509 64->73 71 4036c3-4036cb 65->71 72 403649-403662 GetCurrentProcess OpenProcessToken 65->72 75 4036d1-4036d5 ExitProcess 71->75 76 4036cd 71->76 78 403694-4036a2 call 4062fd 72->78 79 403664-40368e LookupPrivilegeValueA AdjustTokenPrivileges 72->79 73->58 76->75 87 4036b0-4036ba ExitWindowsEx 78->87 88 4036a4-4036ae 78->88 79->78 84 4034bf-4034c1 81->84 85 4034d4-4034e1 call 4059eb 82->85 86 403539-40354d call 4055ec lstrcatA 82->86 84->82 89 4034c3-4034c6 84->89 85->58 95 4034e3-4034f9 call 405f65 * 2 85->95 98 40355a-403574 lstrcatA lstrcmpiA 86->98 99 40354f-403555 lstrcatA 86->99 87->71 92 4036bc-4036be call 40140b 87->92 88->87 88->92 89->82 89->84 92->71 95->64 98->58 101 403576-403579 98->101 99->98 103 403582 call 4055cf 101->103 104 40357b-403580 call 405552 101->104 110 403587-403594 SetCurrentDirectoryA 103->110 104->110 111 4035a1-4035c9 call 405f65 110->111 112 403596-40359c call 405f65 110->112 116 4035cf-4035eb call 405f87 DeleteFileA 111->116 112->111 119 40362c-403633 116->119 120 4035ed-4035fd CopyFileA 116->120 119->116 122 403635-40363c call 405d44 119->122 120->119 121 4035ff-40361f call 405d44 call 405f87 call 405604 120->121 121->119 131 403621-403628 CloseHandle 121->131 122->58 131->119
                            APIs
                            • SetErrorMode.KERNEL32 ref: 00403216
                            • GetVersion.KERNEL32 ref: 0040321C
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040324F
                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040328B
                            • OleInitialize.OLE32(00000000), ref: 00403292
                            • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032AE
                            • GetCommandLineA.KERNEL32(update Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032C3
                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",00000000,?,00000006,00000008,0000000A), ref: 004032D6
                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",00000020,?,00000006,00000008,0000000A), ref: 00403301
                            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 004033FE
                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 0040340F
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040341B
                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040342F
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403437
                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403448
                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403450
                            • DeleteFileA.KERNEL32(1033,?,00000006,00000008,0000000A), ref: 00403464
                              • Part of subcall function 004062FD: GetModuleHandleA.KERNEL32(?,?,?,00403264,0000000A), ref: 0040630F
                              • Part of subcall function 004062FD: GetProcAddress.KERNEL32(00000000,?), ref: 0040632A
                              • Part of subcall function 00405F65: lstrcpynA.KERNEL32(?,?,00000400,004032C3,update Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F72
                              • Part of subcall function 004037B5: GetUserDefaultUILanguage.KERNEL32(00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",00000000), ref: 004037CF
                              • Part of subcall function 004037B5: lstrlenA.KERNEL32(get,?,?,?,get,00000000,00435400,1033,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,75923410), ref: 004038A5
                              • Part of subcall function 004037B5: lstrcmpiA.KERNEL32(?,.exe), ref: 004038B8
                              • Part of subcall function 004037B5: GetFileAttributesA.KERNEL32(get), ref: 004038C3
                              • Part of subcall function 004037B5: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 0040390C
                              • Part of subcall function 004037B5: RegisterClassA.USER32(0042EBA0), ref: 00403949
                            • ExitProcess.KERNEL32(?,?,00000006,00000008,0000000A), ref: 0040350D
                              • Part of subcall function 004036DB: CloseHandle.KERNEL32(FFFFFFFF,00403512,?,?,00000006,00000008,0000000A), ref: 004036E6
                            • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403512
                            • ExitProcess.KERNEL32 ref: 00403533
                            • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403650
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403657
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040366F
                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 0040368E
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004036B2
                            • ExitProcess.KERNEL32 ref: 004036D5
                              • Part of subcall function 00405681: MessageBoxIndirectA.USER32(0040A218), ref: 004056DC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$Exit$FileHandle$EnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDefaultDeleteDirectoryErrorImageIndirectInfoInitializeLanguageLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeUserValueVersionlstrcmpilstrcpyn
                            • String ID: "$"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$update Setup$~nsu
                            • API String ID: 3861850387-507022447
                            • Opcode ID: a934492e7eb9864df341da432a3e1cc9575c5f809a7bed8d112cb4b01729c0eb
                            • Instruction ID: 41c275c355797b12fd9b138c60a2ad170ddd3a1f93bd6a9867a2704463122372
                            • Opcode Fuzzy Hash: a934492e7eb9864df341da432a3e1cc9575c5f809a7bed8d112cb4b01729c0eb
                            • Instruction Fuzzy Hash: 0DC1E470604741AAD7216F759E49B2F3EACAF45706F44053FF581B61E2CB7C8A098B2E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 272 40572d-405753 call 4059eb 275 405755-405767 DeleteFileA 272->275 276 40576c-405773 272->276 277 4058f6-4058fa 275->277 278 405775-405777 276->278 279 405786-405796 call 405f65 276->279 280 4058a4-4058a9 278->280 281 40577d-405780 278->281 287 4057a5-4057a6 call 405944 279->287 288 405798-4057a3 lstrcatA 279->288 280->277 284 4058ab-4058ae 280->284 281->279 281->280 285 4058b0-4058b6 284->285 286 4058b8-4058c0 call 406268 284->286 285->277 286->277 295 4058c2-4058d6 call 4058fd call 4056e5 286->295 290 4057ab-4057ae 287->290 288->290 293 4057b0-4057b7 290->293 294 4057b9-4057bf lstrcatA 290->294 293->294 296 4057c4-4057e2 lstrlenA FindFirstFileA 293->296 294->296 311 4058d8-4058db 295->311 312 4058ee-4058f1 call 40508c 295->312 298 4057e8-4057ff call 405928 296->298 299 40589a-40589e 296->299 305 405801-405805 298->305 306 40580a-40580d 298->306 299->280 301 4058a0 299->301 301->280 305->306 308 405807 305->308 309 405820-40582e call 405f65 306->309 310 40580f-405814 306->310 308->306 322 405830-405838 309->322 323 405845-405850 call 4056e5 309->323 314 405816-405818 310->314 315 405879-40588b FindNextFileA 310->315 311->285 317 4058dd-4058ec call 40508c call 405d44 311->317 312->277 314->309 318 40581a-40581e 314->318 315->298 320 405891-405894 FindClose 315->320 317->277 318->309 318->315 320->299 322->315 325 40583a-405843 call 40572d 322->325 331 405871-405874 call 40508c 323->331 332 405852-405855 323->332 325->315 331->315 334 405857-405867 call 40508c call 405d44 332->334 335 405869-40586f 332->335 334->315 335->315
                            APIs
                            • DeleteFileA.KERNEL32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405756
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040579E
                            • lstrcatA.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057BF
                            • lstrlenA.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057C5
                            • FindFirstFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D6
                            • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405883
                            • FindClose.KERNEL32(00000000), ref: 00405894
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsf640.tmp\*.*$\*.*
                            • API String ID: 2035342205-2086002146
                            • Opcode ID: 5a75186390c9518ef53bc7868eb0b51ef72d35058a64af47be824dbaeb8436d1
                            • Instruction ID: 2a0351abb2716448ee460da7bfccfa5d3c7c3698b554042fcfc8e424752a7a40
                            • Opcode Fuzzy Hash: 5a75186390c9518ef53bc7868eb0b51ef72d35058a64af47be824dbaeb8436d1
                            • Instruction Fuzzy Hash: 2551B132900A04AAEF217B268C45FBF7A78DF42754F14817BF841B61D1D73C8952DEA9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 546 406268-40627c FindFirstFileA 547 406289 546->547 548 40627e-406287 FindClose 546->548 549 40628b-40628c 547->549 548->549
                            APIs
                            • FindFirstFileA.KERNEL32(75923410,0042C0C0,C:\,00405A2E,C:\,C:\,00000000,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,0040574D,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 00406273
                            • FindClose.KERNEL32(00000000), ref: 0040627F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID: C:\
                            • API String ID: 2295610775-3404278061
                            • Opcode ID: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                            • Instruction ID: e0279db6a2f9a876ecb4b02bc738002a428a13ad585e0dc9357aaf1afb57e826
                            • Opcode Fuzzy Hash: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                            • Instruction Fuzzy Hash: 9DD012365060209FC25027786D0C85B7A589F053317118B7FF8AAF21E0C7348CA386DC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 132 4037b5-4037cd call 4062fd 135 4037e1-403812 call 405e4c 132->135 136 4037cf-4037da GetUserDefaultUILanguage call 405ec3 132->136 142 403814-403825 call 405e4c 135->142 143 40382a-403830 lstrcatA 135->143 139 4037df 136->139 141 403835-40385e call 403a7a call 4059eb 139->141 149 403864-403869 141->149 150 4038e5-4038ed call 4059eb 141->150 142->143 143->141 149->150 151 40386b-40388f call 405e4c 149->151 156 4038fb-403920 LoadImageA 150->156 157 4038ef-4038f6 call 405f87 150->157 151->150 158 403891-403893 151->158 160 4039a1-4039a9 call 40140b 156->160 161 403922-403952 RegisterClassA 156->161 157->156 162 4038a4-4038b0 lstrlenA 158->162 163 403895-4038a2 call 405928 158->163 175 4039b3-4039be call 403a7a 160->175 176 4039ab-4039ae 160->176 164 403a70 161->164 165 403958-40399c SystemParametersInfoA CreateWindowExA 161->165 169 4038b2-4038c0 lstrcmpiA 162->169 170 4038d8-4038e0 call 4058fd call 405f65 162->170 163->162 168 403a72-403a79 164->168 165->160 169->170 174 4038c2-4038cc GetFileAttributesA 169->174 170->150 179 4038d2-4038d3 call 405944 174->179 180 4038ce-4038d0 174->180 184 4039c4-4039de ShowWindow call 40628f 175->184 185 403a47-403a4f call 40515e 175->185 176->168 179->170 180->170 180->179 192 4039e0-4039e5 call 40628f 184->192 193 4039ea-4039fc GetClassInfoA 184->193 190 403a51-403a57 185->190 191 403a69-403a6b call 40140b 185->191 190->176 194 403a5d-403a64 call 40140b 190->194 191->164 192->193 197 403a14-403a45 DialogBoxParamA call 40140b call 403705 193->197 198 4039fe-403a0e GetClassInfoA RegisterClassA 193->198 194->176 197->168 198->197
                            APIs
                              • Part of subcall function 004062FD: GetModuleHandleA.KERNEL32(?,?,?,00403264,0000000A), ref: 0040630F
                              • Part of subcall function 004062FD: GetProcAddress.KERNEL32(00000000,?), ref: 0040632A
                            • GetUserDefaultUILanguage.KERNEL32(00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",00000000), ref: 004037CF
                              • Part of subcall function 00405EC3: wsprintfA.USER32 ref: 00405ED0
                            • lstrcatA.KERNEL32(1033,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",00000000), ref: 00403830
                            • lstrlenA.KERNEL32(get,?,?,?,get,00000000,00435400,1033,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,75923410), ref: 004038A5
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004038B8
                            • GetFileAttributesA.KERNEL32(get), ref: 004038C3
                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 0040390C
                            • RegisterClassA.USER32(0042EBA0), ref: 00403949
                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403961
                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403996
                            • ShowWindow.USER32(00000005,00000000), ref: 004039CC
                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 004039F8
                            • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A05
                            • RegisterClassA.USER32(0042EBA0), ref: 00403A0E
                            • DialogBoxParamA.USER32(?,00000000,00403B52,00000000), ref: 00403A2D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$get
                            • API String ID: 606308-1916490003
                            • Opcode ID: e7acd2a6494bceed2f0d1790c8c795125d1bc5b972d8e893fdd29642874af84d
                            • Instruction ID: cf57693f3f88dc886a5042f17341946b18930627488d4c28d640959b633c26bb
                            • Opcode Fuzzy Hash: e7acd2a6494bceed2f0d1790c8c795125d1bc5b972d8e893fdd29642874af84d
                            • Instruction Fuzzy Hash: 3E61D770240600AED620BB669D45F373EACEB44749F40447EF985B22E2DB7C9D029A2D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 402d48-402d96 GetTickCount GetModuleFileNameA call 405afe 208 402da2-402dd0 call 405f65 call 405944 call 405f65 GetFileSize 205->208 209 402d98-402d9d 205->209 217 402dd6 208->217 218 402ebd-402ecb call 402ce4 208->218 210 402f7a-402f7e 209->210 219 402ddb-402df2 217->219 225 402f20-402f25 218->225 226 402ecd-402ed0 218->226 221 402df4 219->221 222 402df6-402dff call 403193 219->222 221->222 231 402e05-402e0c 222->231 232 402f27-402f2f call 402ce4 222->232 225->210 227 402ed2-402eea call 4031a9 call 403193 226->227 228 402ef4-402f1e GlobalAlloc call 4031a9 call 402f81 226->228 227->225 251 402eec-402ef2 227->251 228->225 256 402f31-402f42 228->256 235 402e88-402e8c 231->235 236 402e0e-402e22 call 405ab9 231->236 232->225 240 402e96-402e9c 235->240 241 402e8e-402e95 call 402ce4 235->241 236->240 254 402e24-402e2b 236->254 247 402eab-402eb5 240->247 248 402e9e-402ea8 call 4063b4 240->248 241->240 247->219 255 402ebb 247->255 248->247 251->225 251->228 254->240 260 402e2d-402e34 254->260 255->218 257 402f44 256->257 258 402f4a-402f4f 256->258 257->258 261 402f50-402f56 258->261 260->240 262 402e36-402e3d 260->262 261->261 263 402f58-402f73 SetFilePointer call 405ab9 261->263 262->240 264 402e3f-402e46 262->264 267 402f78 263->267 264->240 266 402e48-402e68 264->266 266->225 268 402e6e-402e72 266->268 267->210 269 402e74-402e78 268->269 270 402e7a-402e82 268->270 269->255 269->270 270->240 271 402e84-402e86 270->271 271->240
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402D59
                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,00000400), ref: 00402D75
                              • Part of subcall function 00405AFE: GetFileAttributesA.KERNEL32(00000003,00402D88,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,80000000,00000003), ref: 00405B02
                              • Part of subcall function 00405AFE: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B24
                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,80000000,00000003), ref: 00402DC1
                            Strings
                            • C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe, xrefs: 00402D5F, 00402D6E, 00402D82, 00402DA2
                            • C:\Users\user\Desktop, xrefs: 00402DA3, 00402DA8, 00402DAE
                            • "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe", xrefs: 00402D48
                            • soft, xrefs: 00402E36
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D4F
                            • Error launching installer, xrefs: 00402D98
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F20
                            • Inst, xrefs: 00402E2D
                            • Null, xrefs: 00402E3F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                            • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 4283519449-3276705621
                            • Opcode ID: 3d8226c6182f45256fef3b08a8e24db4a20154253ee5507602079156fa8385bc
                            • Instruction ID: b7ea9236aecaa86e611592eb70b2ed5589fa10121b1bd9207fea2451aa196312
                            • Opcode Fuzzy Hash: 3d8226c6182f45256fef3b08a8e24db4a20154253ee5507602079156fa8385bc
                            • Instruction Fuzzy Hash: 9D51F431A00215ABDB20AF64DE89B9F7BB8FB14358F50413BE504B72D1C7B88D858B9C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 341 402f81-402f95 342 402f97 341->342 343 402f9e-402fa7 341->343 342->343 344 402fb0-402fb5 343->344 345 402fa9 343->345 346 402fc5-402fd2 call 403193 344->346 347 402fb7-402fc0 call 4031a9 344->347 345->344 351 403181 346->351 352 402fd8-402fdc 346->352 347->346 353 403183-403184 351->353 354 402fe2-40302b GetTickCount 352->354 355 40312c-40312e 352->355 356 40318c-403190 353->356 357 403031-403039 354->357 358 403189 354->358 359 403130-403133 355->359 360 40316e-403171 355->360 362 40303b 357->362 363 40303e-40304c call 403193 357->363 358->356 359->358 361 403135 359->361 364 403173 360->364 365 403176-40317f call 403193 360->365 366 403138-40313e 361->366 362->363 363->351 375 403052-40305b 363->375 364->365 365->351 373 403186 365->373 369 403140 366->369 370 403142-403150 call 403193 366->370 369->370 370->351 378 403152-40315e call 405ba5 370->378 373->358 377 403061-403081 call 406422 375->377 383 403124-403126 377->383 384 403087-40309a GetTickCount 377->384 385 403160-40316a 378->385 386 403128-40312a 378->386 383->353 387 40309c-4030a4 384->387 388 4030df-4030e1 384->388 385->366 391 40316c 385->391 386->353 392 4030a6-4030aa 387->392 393 4030ac-4030dc MulDiv wsprintfA call 40508c 387->393 389 4030e3-4030e7 388->389 390 403118-40311c 388->390 394 4030e9-4030f0 call 405ba5 389->394 395 4030fe-403109 389->395 390->357 396 403122 390->396 391->358 392->388 392->393 393->388 401 4030f5-4030f7 394->401 400 40310c-403110 395->400 396->358 400->377 402 403116 400->402 401->386 403 4030f9-4030fc 401->403 402->358 403->400
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: (TA$(TA$(A$... %d%%
                            • API String ID: 551687249-3855943882
                            • Opcode ID: 219cae2b91f3bf38bad7132d0a8990421fc9c3883ef73589e1e6bd7f052db87f
                            • Instruction ID: f4b3021151c61e236b0315b1fcc5adb3b60be84788d5942dbd3e7f3cce39453d
                            • Opcode Fuzzy Hash: 219cae2b91f3bf38bad7132d0a8990421fc9c3883ef73589e1e6bd7f052db87f
                            • Instruction Fuzzy Hash: 86517D71900219EBDB10DF65DA4469E7BB8EF48356F14853BE800BB2D0C7789E41CBAD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 404 401759-40177c call 402ac1 call 40596a 409 401786-401798 call 405f65 call 4058fd lstrcatA 404->409 410 40177e-401784 call 405f65 404->410 415 40179d-4017a3 call 4061cf 409->415 410->415 420 4017a8-4017ac 415->420 421 4017ae-4017b8 call 406268 420->421 422 4017df-4017e2 420->422 430 4017ca-4017dc 421->430 431 4017ba-4017c8 CompareFileTime 421->431 424 4017e4-4017e5 call 405ad9 422->424 425 4017ea-401806 call 405afe 422->425 424->425 432 401808-40180b 425->432 433 40187e-4018a7 call 40508c call 402f81 425->433 430->422 431->430 434 401860-40186a call 40508c 432->434 435 40180d-40184f call 405f65 * 2 call 405f87 call 405f65 call 405681 432->435 447 4018a9-4018ad 433->447 448 4018af-4018bb SetFileTime 433->448 445 401873-401879 434->445 435->420 467 401855-401856 435->467 449 40295a 445->449 447->448 451 4018c1-4018cc FindCloseChangeNotification 447->451 448->451 454 40295c-402960 449->454 452 402951-402954 451->452 453 4018d2-4018d5 451->453 452->449 456 4018d7-4018e8 call 405f87 lstrcatA 453->456 457 4018ea-4018ed call 405f87 453->457 463 4018f2-4022e6 call 405681 456->463 457->463 463->452 463->454 467->445 469 401858-401859 467->469 469->434
                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,get,00435800,00000000,00000000,00000031), ref: 00401798
                            • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,00435800,00000000,00000000,00000031), ref: 004017C2
                              • Part of subcall function 00405F65: lstrcpynA.KERNEL32(?,?,00000400,004032C3,update Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F72
                              • Part of subcall function 0040508C: lstrlenA.KERNEL32(0042A050,00000000,0041EA28,759223A0,?,?,?,?,?,?,?,?,?,004030DC,00000000,?), ref: 004050C5
                              • Part of subcall function 0040508C: lstrlenA.KERNEL32(004030DC,0042A050,00000000,0041EA28,759223A0,?,?,?,?,?,?,?,?,?,004030DC,00000000), ref: 004050D5
                              • Part of subcall function 0040508C: lstrcatA.KERNEL32(0042A050,004030DC,004030DC,0042A050,00000000,0041EA28,759223A0), ref: 004050E8
                              • Part of subcall function 0040508C: SetWindowTextA.USER32(0042A050,0042A050), ref: 004050FA
                              • Part of subcall function 0040508C: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405120
                              • Part of subcall function 0040508C: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513A
                              • Part of subcall function 0040508C: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405148
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: C:\Users\user\AppData\Local\Temp\nsf640.tmp\INetC.dll$get
                            • API String ID: 1941528284-2348429422
                            • Opcode ID: d5b44f832fdb25be28d2b543a9b61bfb24a32d76e5489e3aa463aebb2df8a026
                            • Instruction ID: 024705dcfdf044f05b4b82656432081f20986447a00b4521f0a60d415ab43704
                            • Opcode Fuzzy Hash: d5b44f832fdb25be28d2b543a9b61bfb24a32d76e5489e3aa463aebb2df8a026
                            • Instruction Fuzzy Hash: 4841B431A04515BECB107BB58C45EAF3679EF05369F60833BF421F20E1D67C89428A6D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 471 405552-40559d CreateDirectoryA 472 4055a3-4055b0 GetLastError 471->472 473 40559f-4055a1 471->473 474 4055ca-4055cc 472->474 475 4055b2-4055c6 SetFileSecurityA 472->475 473->474 475->473 476 4055c8 GetLastError 475->476 476->474
                            APIs
                            • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405595
                            • GetLastError.KERNEL32 ref: 004055A9
                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055BE
                            • GetLastError.KERNEL32 ref: 004055C8
                            Strings
                            • C:\Users\user\Desktop, xrefs: 00405552
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405578
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                            • API String ID: 3449924974-1521822154
                            • Opcode ID: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                            • Instruction ID: d93b5df8f7ffc7c008eac1e7bdc238e6dcac3e6f5ce479452586b7e310885e58
                            • Opcode Fuzzy Hash: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                            • Instruction Fuzzy Hash: 550108B1C00219EADF11DBA1CD047EFBFB9EF04354F00803AD545B6290D77896088FA9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 477 40628f-4062af GetSystemDirectoryA 478 4062b1 477->478 479 4062b3-4062b5 477->479 478->479 480 4062c5-4062c7 479->480 481 4062b7-4062bf 479->481 483 4062c8-4062fa wsprintfA LoadLibraryExA 480->483 481->480 482 4062c1-4062c3 481->482 482->483
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062A6
                            • wsprintfA.USER32 ref: 004062DF
                            • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004062F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%s.dll$UXTHEME$\
                            • API String ID: 2200240437-4240819195
                            • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                            • Instruction ID: 90c405808a5079913e9fc86ee6967ca4c100a0af48b71fe7beb271d56a4ee20c
                            • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                            • Instruction Fuzzy Hash: 89F0F630510609AADB15AB64DD0DFEB365CAB08304F1405BEA686F11C1EA78E9398B99
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 484 405b2d-405b37 485 405b38-405b63 GetTickCount GetTempFileNameA 484->485 486 405b72-405b74 485->486 487 405b65-405b67 485->487 489 405b6c-405b6f 486->489 487->485 488 405b69 487->488 488->489
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405B41
                            • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B5B
                            Strings
                            • "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe", xrefs: 00405B2D
                            • nsa, xrefs: 00405B38
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B30
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-1723881821
                            • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                            • Instruction ID: 439a7608ba980c1fff97265348ba0c774925dff8d33d3cb941cf273fff524f8a
                            • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                            • Instruction Fuzzy Hash: B0F082363042086BDB108F66DD04B9B7BA9DF91750F14803BFA48AA280D6B4E9588799
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 490 4059eb-405a06 call 405f65 call 405996 495 405a08-405a0a 490->495 496 405a0c-405a19 call 4061cf 490->496 497 405a5e-405a60 495->497 500 405a25-405a27 496->500 501 405a1b-405a1f 496->501 503 405a3d-405a46 lstrlenA 500->503 501->495 502 405a21-405a23 501->502 502->495 502->500 504 405a48-405a5c call 4058fd GetFileAttributesA 503->504 505 405a29-405a30 call 406268 503->505 504->497 510 405a32-405a35 505->510 511 405a37-405a38 call 405944 505->511 510->495 510->511 511->503
                            APIs
                              • Part of subcall function 00405F65: lstrcpynA.KERNEL32(?,?,00000400,004032C3,update Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F72
                              • Part of subcall function 00405996: CharNextA.USER32(?,?,C:\,?,00405A02,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,0040574D,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059A4
                              • Part of subcall function 00405996: CharNextA.USER32(00000000), ref: 004059A9
                              • Part of subcall function 00405996: CharNextA.USER32(00000000), ref: 004059BD
                            • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,0040574D,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A3E
                            • GetFileAttributesA.KERNEL32(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,0040574D,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 00405A4E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 3248276644-1964270705
                            • Opcode ID: abce9bb9807016b4c276db8bae45b4b3eed95d690bc7d0fbdb1e72e6f8ad0fcb
                            • Instruction ID: 1f06baf1138d21f74630751e728cacf5283a8138a78bcc2982ba797f27b9272c
                            • Opcode Fuzzy Hash: abce9bb9807016b4c276db8bae45b4b3eed95d690bc7d0fbdb1e72e6f8ad0fcb
                            • Instruction Fuzzy Hash: 53F0C831315DA256C622323A1D45AAF1B45CE87338709477FF891B12D2EB3C89439EBD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 513 401ffd-402009 514 4020c4-4020c6 513->514 515 40200f-402025 call 402ac1 * 2 513->515 516 402237-40223c call 401423 514->516 526 402034-402042 LoadLibraryExA 515->526 527 402027-402032 GetModuleHandleA 515->527 522 402951-402960 516->522 523 402716-40271d 516->523 523->522 528 402044-402051 GetProcAddress 526->528 530 4020bd-4020bf 526->530 527->526 527->528 531 402090-402095 call 40508c 528->531 532 402053-402059 528->532 530->516 537 40209a-40209d 531->537 533 402072-40208e 532->533 534 40205b-402067 call 401423 532->534 533->537 534->537 545 402069-402070 534->545 537->522 540 4020a3-4020ab call 403755 537->540 540->522 544 4020b1-4020b8 FreeLibrary 540->544 544->522 545->537
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00402028
                              • Part of subcall function 0040508C: lstrlenA.KERNEL32(0042A050,00000000,0041EA28,759223A0,?,?,?,?,?,?,?,?,?,004030DC,00000000,?), ref: 004050C5
                              • Part of subcall function 0040508C: lstrlenA.KERNEL32(004030DC,0042A050,00000000,0041EA28,759223A0,?,?,?,?,?,?,?,?,?,004030DC,00000000), ref: 004050D5
                              • Part of subcall function 0040508C: lstrcatA.KERNEL32(0042A050,004030DC,004030DC,0042A050,00000000,0041EA28,759223A0), ref: 004050E8
                              • Part of subcall function 0040508C: SetWindowTextA.USER32(0042A050,0042A050), ref: 004050FA
                              • Part of subcall function 0040508C: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405120
                              • Part of subcall function 0040508C: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513A
                              • Part of subcall function 0040508C: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405148
                            • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402038
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                            • String ID:
                            • API String ID: 2987980305-0
                            • Opcode ID: c269c81cb85478e00bfc3d4b8c9c0837da33454893b7d03bdc32fa3c52a9d6d9
                            • Instruction ID: 3b54ba627a5d3606a08c88bc2c88048367fe0e0edc5ddf34d35ff9eabd327fef
                            • Opcode Fuzzy Hash: c269c81cb85478e00bfc3d4b8c9c0837da33454893b7d03bdc32fa3c52a9d6d9
                            • Instruction Fuzzy Hash: A721DB71A04225ABCF207FA48E49B6E7670AB14358F20413BFB11B62D0CBBD4942966E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 550 4023d0-402401 call 402ac1 * 2 call 402b51 557 402951-402960 550->557 558 402407-402411 550->558 560 402421-402424 558->560 561 402413-402420 call 402ac1 lstrlenA 558->561 564 402426-402437 call 402a9f 560->564 565 402438-40243b 560->565 561->560 564->565 567 40244c-402460 RegSetValueExA 565->567 568 40243d-402447 call 402f81 565->568 572 402462 567->572 573 402465-402542 RegCloseKey 567->573 568->567 572->573 573->557 575 402716-40271d 573->575 575->557
                            APIs
                            • lstrlenA.KERNEL32(0040AC18,00000023,00000011,00000002), ref: 0040241B
                            • RegSetValueExA.ADVAPI32(?,?,?,?,0040AC18,00000000,00000011,00000002), ref: 00402458
                            • RegCloseKey.KERNEL32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 0040253C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseValuelstrlen
                            • String ID:
                            • API String ID: 2655323295-0
                            • Opcode ID: 40e48cbbd769b2ddb4f8648729e7aecfaa2ba646ef1a89aa45d066a868b0220d
                            • Instruction ID: f3bc197a49376025d104d1766b7c26e04d62aafcfa214307c08bf0afb556c6f3
                            • Opcode Fuzzy Hash: 40e48cbbd769b2ddb4f8648729e7aecfaa2ba646ef1a89aa45d066a868b0220d
                            • Instruction Fuzzy Hash: AD117271F00215BEDF10AFA59E89A9E7A74DB54314F20403AF908B61D1CAB84D419B68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 576 4024df-4024fa call 402b01 call 402a9f 581 402500-40250b 576->581 582 402716-40271d 576->582 583 402519-40252c RegEnumValueA 581->583 584 40250d-402517 RegEnumKeyA 581->584 585 402951-402960 582->585 587 402535-402542 RegCloseKey 583->587 588 40252e 583->588 584->587 587->582 587->585 588->587
                            APIs
                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402511
                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 00402524
                            • RegCloseKey.KERNEL32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 0040253C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Enum$CloseValue
                            • String ID:
                            • API String ID: 397863658-0
                            • Opcode ID: ef5c3727a20db656ff5052f27e775ba80b940bc42b506935cef35a5b807bc4bf
                            • Instruction ID: 7cc4705ec6358afed730085f06e11861ce0f90fa753b06a9139c19a758a622df
                            • Opcode Fuzzy Hash: ef5c3727a20db656ff5052f27e775ba80b940bc42b506935cef35a5b807bc4bf
                            • Instruction Fuzzy Hash: D801B171A04105BFE7159F699E9CABF7A7CDF40348F10003EF405A61C0DAB84A459769
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 592 4056e5-4056f6 call 405ad9 595 405726 592->595 596 4056f8-4056fe 592->596 597 405728-40572a 595->597 598 405700-405706 RemoveDirectoryA 596->598 599 405708 DeleteFileA 596->599 600 40570e-405710 598->600 599->600 601 405712-405715 600->601 602 405717-40571c 600->602 601->597 602->595 603 40571e-405720 SetFileAttributesA 602->603 603->595
                            APIs
                              • Part of subcall function 00405AD9: GetFileAttributesA.KERNEL32(?,?,004056F1,?,?,00000000,004058D4,?,?,?,?), ref: 00405ADE
                              • Part of subcall function 00405AD9: SetFileAttributesA.KERNEL32(?,00000000), ref: 00405AF2
                            • RemoveDirectoryA.KERNEL32(?,?,?,00000000,004058D4), ref: 00405700
                            • DeleteFileA.KERNEL32(?,?,?,00000000,004058D4), ref: 00405708
                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405720
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$Attributes$DeleteDirectoryRemove
                            • String ID:
                            • API String ID: 1655745494-0
                            • Opcode ID: 4390be6e2ef8d2df5986f304b1f187f42b365e072cd754739d21517cc83f2d57
                            • Instruction ID: ab3c30a2a51d8520bfc91e36631e3b158bafcebe445a439927c7769123fd08c9
                            • Opcode Fuzzy Hash: 4390be6e2ef8d2df5986f304b1f187f42b365e072cd754739d21517cc83f2d57
                            • Instruction Fuzzy Hash: E4E0E531115A91D6C2106774AE0865B2AD8EFC6364F05493BF892B30C0DB78880BAA6E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00405996: CharNextA.USER32(?,?,C:\,?,00405A02,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,0040574D,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059A4
                              • Part of subcall function 00405996: CharNextA.USER32(00000000), ref: 004059A9
                              • Part of subcall function 00405996: CharNextA.USER32(00000000), ref: 004059BD
                            • GetFileAttributesA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                              • Part of subcall function 00405552: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405595
                            • SetCurrentDirectoryA.KERNEL32(00000000,00435800,00000000,00000000,000000F0), ref: 0040163C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                            • String ID:
                            • API String ID: 1892508949-0
                            • Opcode ID: 6e9d8b0bdd6535f5ad521cfe25d2546e39bd3477eb11d702e3e3618c9b95e55c
                            • Instruction ID: 323619fe81b3529d61600e1e0eff0ce417d4ac591c1c2d39a63079fc07480124
                            • Opcode Fuzzy Hash: 6e9d8b0bdd6535f5ad521cfe25d2546e39bd3477eb11d702e3e3618c9b95e55c
                            • Instruction Fuzzy Hash: 2B11C431608152EBCB217BA54D415BF2AB4DA96324B28093FE9D1B22E2D63D4D425A2E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegQueryValueExA.KERNEL32(00000000,00000000,?,?,?,?), ref: 0040249D
                            • RegCloseKey.KERNEL32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 0040253C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID:
                            • API String ID: 3356406503-0
                            • Opcode ID: 7d3c6902f9d33eca87671391b91be3ed48a1ca6425a0692cb99cfd7bae844a24
                            • Instruction ID: 63e30908c11e451fd6d37fbe2862c18829a27713504d584fb03aa75526d5f0f4
                            • Opcode Fuzzy Hash: 7d3c6902f9d33eca87671391b91be3ed48a1ca6425a0692cb99cfd7bae844a24
                            • Instruction Fuzzy Hash: 0D110471A00205EECB14CF64DA889AF7AB4DF04304F20403FE446B72C0D6B88A42DB29
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                            • Instruction ID: f90ead50954d10692fd747fd35726c7c61e2fcf071c036ef7d407bcf2d164b43
                            • Opcode Fuzzy Hash: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                            • Instruction Fuzzy Hash: 4601F4317242109BE7199B399D04B6A3698E710719F54823FF852F61F1D678EC028B4C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleA.KERNEL32(?,?,?,00403264,0000000A), ref: 0040630F
                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040632A
                              • Part of subcall function 0040628F: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062A6
                              • Part of subcall function 0040628F: wsprintfA.USER32 ref: 004062DF
                              • Part of subcall function 0040628F: LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004062F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: 30985bc18176bda4dfc46ca2d396654736e9499ca8d22b71f2c1527f66d3312f
                            • Instruction ID: 0a5867ae11c12db0e7684f2d0d3995392d51af775f5f68958dac655171f1c28e
                            • Opcode Fuzzy Hash: 30985bc18176bda4dfc46ca2d396654736e9499ca8d22b71f2c1527f66d3312f
                            • Instruction Fuzzy Hash: 83E08C32604221ABD210AB749E0493B63A8EF98740306483EF94AF2240DB3C9C7296A9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetFileAttributesA.KERNEL32(00000003,00402D88,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,80000000,00000003), ref: 00405B02
                            • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B24
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                            • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                            • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                            • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetFileAttributesA.KERNEL32(?,?,004056F1,?,?,00000000,004058D4,?,?,?,?), ref: 00405ADE
                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405AF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AttributesFile
                            • String ID:
                            • API String ID: 3188754299-0
                            • Opcode ID: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                            • Instruction ID: a8f15113e5c9b75401305b8f42f7b900fd80c9315a1f16fe78aaf2180abbdc87
                            • Opcode Fuzzy Hash: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                            • Instruction Fuzzy Hash: B8D0C972504122ABC2102728AE0889BBB55DB54271702CB35F9B9A26B1DB304C56AA98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CloseHandle.KERNEL32(FFFFFFFF,00403512,?,?,00000006,00000008,0000000A), ref: 004036E6
                            Strings
                            • C:\Users\user\AppData\Local\Temp\nsf640.tmp\, xrefs: 004036FA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID: C:\Users\user\AppData\Local\Temp\nsf640.tmp\
                            • API String ID: 2962429428-1036879740
                            • Opcode ID: 7bb9d04c8b35ddb385cf310f384fb45be282d55caa20868854ffc01acd183563
                            • Instruction ID: a1bde45f6d244ba91e802d61d3971a42b11b03c2813ac8242e2f7427b9539a77
                            • Opcode Fuzzy Hash: 7bb9d04c8b35ddb385cf310f384fb45be282d55caa20868854ffc01acd183563
                            • Instruction Fuzzy Hash: 5DC01270504701A6C5346F74AE4F6093A14AB44735F604725B0B5F21F1CB7C565A556E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateDirectoryA.KERNEL32(?,00000000,004031E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 004055D5
                            • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004055E3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                            • Instruction ID: ff59ce228810ab0b399ea54ffc24e93d20618ce1ebfa51e1db99450e15aaec59
                            • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                            • Instruction Fuzzy Hash: FAC08C30200101ABDB010B318F08B073A62AB80380F0288396042E00B4CA308004C92E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ReadFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031A6,00000000,00000000,00402FD0,000000FF,00000004,00000000,00000000,00000000), ref: 00405B8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                            • Instruction ID: d6e1a33fd195441beba49eedd959afadaf6b56434895abd4101947bffd5346ea
                            • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                            • Instruction Fuzzy Hash: 21E0EC3221065EABDF10AE559C04AEB7B6CEB05360F004437F915E3150D635F9219BA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040315C,00000000,00415428,000000FF,00415428,000000FF,000000FF,00000004,00000000), ref: 00405BB9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                            • Instruction ID: 823d1a00ca840d25d454e1cdeec80758da7ba5e35e2b738bcb0e321267d0793f
                            • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                            • Instruction Fuzzy Hash: DEE0EC3222075EAFDF50AE559C00AEB7B7CEB05760F004437F925E2190E631F9219BAC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegOpenKeyExA.KERNEL32(00000000,?,00000000,?,?,0042A050,?,?,00405E79,0042A050,?,?,?,00000002,get), ref: 00405E0F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction ID: dc79c12829c29cd0bf07e2dbeefb197667dc07549b84f10616122407915bdb74
                            • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction Fuzzy Hash: E4D0123210060DBBDF115F90ED05FAB371DEB48314F004826FE45A4091E775D670AF98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00402F0F,?), ref: 004031B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404A21
                            • GetDlgItem.USER32(?,00000408), ref: 00404A2C
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A76
                            • LoadBitmapA.USER32(0000006E), ref: 00404A89
                            • SetWindowLongA.USER32(?,000000FC,00405000), ref: 00404AA2
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AB6
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404AC8
                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404ADE
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404AEA
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404AFC
                            • DeleteObject.GDI32(00000000), ref: 00404AFF
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B2A
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B36
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BCB
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404BF6
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C0A
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404C39
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C47
                            • ShowWindow.USER32(?,00000005), ref: 00404C58
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D55
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DBA
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404DCF
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404DF3
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E13
                            • ImageList_Destroy.COMCTL32(?), ref: 00404E28
                            • GlobalFree.KERNEL32(?), ref: 00404E38
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EB1
                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404F5A
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404F69
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F89
                            • ShowWindow.USER32(?,00000000), ref: 00404FD7
                            • GetDlgItem.USER32(?,000003FE), ref: 00404FE2
                            • ShowWindow.USER32(00000000), ref: 00404FE9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: 3b740f44a2b1d633ad343a76b016798f79b98c3f4b333677a90c7392331c9530
                            • Instruction ID: 5e7fd9033250abe3372a8cc080de2667683fe8f184775387c018329cb0bba4e6
                            • Opcode Fuzzy Hash: 3b740f44a2b1d633ad343a76b016798f79b98c3f4b333677a90c7392331c9530
                            • Instruction Fuzzy Hash: 9502A1B0A00209AFEB20DF55DD85AAE7BB5FB84315F14413AFA10B62E1C7789D42CF58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 00405229
                            • GetDlgItem.USER32(?,000003EE), ref: 00405238
                            • GetClientRect.USER32(?,?), ref: 00405275
                            • GetSystemMetrics.USER32(00000002), ref: 0040527C
                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040529D
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052AE
                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052C1
                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 004052CF
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 004052E2
                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405304
                            • ShowWindow.USER32(?,00000008), ref: 00405318
                            • GetDlgItem.USER32(?,000003EC), ref: 00405339
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405349
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405362
                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040536E
                            • GetDlgItem.USER32(?,000003F8), ref: 00405247
                              • Part of subcall function 0040405B: SendMessageA.USER32(00000028,?,00000001,00403E8B), ref: 00404069
                            • GetDlgItem.USER32(?,000003EC), ref: 0040538A
                            • CreateThread.KERNEL32(00000000,00000000,Function_0000515E,00000000), ref: 00405398
                            • CloseHandle.KERNEL32(00000000), ref: 0040539F
                            • ShowWindow.USER32(00000000), ref: 004053C2
                            • ShowWindow.USER32(?,00000008), ref: 004053C9
                            • ShowWindow.USER32(00000008), ref: 0040540F
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405443
                            • CreatePopupMenu.USER32 ref: 00405454
                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405469
                            • GetWindowRect.USER32(?,000000FF), ref: 00405489
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054A2
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054DE
                            • OpenClipboard.USER32(00000000), ref: 004054EE
                            • EmptyClipboard.USER32 ref: 004054F4
                            • GlobalAlloc.KERNEL32(00000042,?), ref: 004054FD
                            • GlobalLock.KERNEL32(00000000), ref: 00405507
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040551B
                            • GlobalUnlock.KERNEL32(00000000), ref: 00405534
                            • SetClipboardData.USER32(00000001,00000000), ref: 0040553F
                            • CloseClipboard.USER32 ref: 00405545
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID:
                            • API String ID: 590372296-0
                            • Opcode ID: d5273281f7ca55948d0d67e565d88e3eec44a4adc77553a27c5bfa0cd5b41917
                            • Instruction ID: ba98567820032f63b871bd6861c5d6e43a3521a54ecc658c1b1e5281d96d67ec
                            • Opcode Fuzzy Hash: d5273281f7ca55948d0d67e565d88e3eec44a4adc77553a27c5bfa0cd5b41917
                            • Instruction Fuzzy Hash: D6A14971900608BFDF11AF61DE89AAF7F79EB04354F40403AFA41B61A0CB755E519F68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 004044E5
                            • SetWindowTextA.USER32(00000000,?), ref: 0040450F
                            • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045C0
                            • CoTaskMemFree.OLE32(00000000), ref: 004045CB
                            • lstrcmpiA.KERNEL32(get,0042A870), ref: 004045FD
                            • lstrcatA.KERNEL32(?,get), ref: 00404609
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040461B
                              • Part of subcall function 00405665: GetDlgItemTextA.USER32(?,?,00000400,00404652), ref: 00405678
                              • Part of subcall function 004061CF: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00406227
                              • Part of subcall function 004061CF: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406234
                              • Part of subcall function 004061CF: CharNextA.USER32(?,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00406239
                              • Part of subcall function 004061CF: CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00406249
                            • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,00000001,00429840,?,?,000003FB,?), ref: 004046D9
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046F4
                              • Part of subcall function 0040484D: lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404768,000000DF,00000000,00000400,?), ref: 004048EB
                              • Part of subcall function 0040484D: wsprintfA.USER32 ref: 004048F3
                              • Part of subcall function 0040484D: SetDlgItemTextA.USER32(?,0042A870), ref: 00404906
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A$get
                            • API String ID: 2624150263-2392541679
                            • Opcode ID: 20b6d9ced992337b1412f46738ab000ca340b2c21d94be4f2955b414de4e2f25
                            • Instruction ID: e7c3eafb31c7d15e6a6da749512948d226074c80576101813d8e7fa34d4e7a23
                            • Opcode Fuzzy Hash: 20b6d9ced992337b1412f46738ab000ca340b2c21d94be4f2955b414de4e2f25
                            • Instruction Fuzzy Hash: 44A190B1900209ABDB11AFA6CD45AAFB7B8EF85314F14843BF605B72D1D77C89418B2D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CoCreateInstance.OLE32(00408514,?,00000001,00408504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214D
                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021FC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ByteCharCreateInstanceMultiWide
                            • String ID:
                            • API String ID: 123533781-0
                            • Opcode ID: 3ab9ca111cfd16ea316d8908730db186f13cf70328ad1dfde5033f2efd3f2ba1
                            • Instruction ID: 70e90dd273e36d6cf470b0c6c9ff695bb876e65ea6d8ae05c01ad1deac9bcbee
                            • Opcode Fuzzy Hash: 3ab9ca111cfd16ea316d8908730db186f13cf70328ad1dfde5033f2efd3f2ba1
                            • Instruction Fuzzy Hash: D9512775A00208BFCF10DFE4C988A9DBBB5EF48318F2045AAF915EB2D1DA799941CF14
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: 35474e701519af4a3bfe5b21ab3a1074e282d3bfb0b95cafabb6a5a8f21aa47d
                            • Instruction ID: 5589ad20af1132df25b1d4da55578e461c11660e8300270abb34f4e41d1b37c2
                            • Opcode Fuzzy Hash: 35474e701519af4a3bfe5b21ab3a1074e282d3bfb0b95cafabb6a5a8f21aa47d
                            • Instruction Fuzzy Hash: 8BF0A0726041119AD710E7B49999EEEB778DB21324F60057BE685F20C1C6B88A469B2A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8a4aeacf9715bb3b10a0377ad2d0224b4eefc29aff23ed095be582f5b156e71c
                            • Instruction ID: 12ef56279526f9f53f22afc89151adbe845766d01d6fb7ada6890335ffbed449
                            • Opcode Fuzzy Hash: 8a4aeacf9715bb3b10a0377ad2d0224b4eefc29aff23ed095be582f5b156e71c
                            • Instruction Fuzzy Hash: 5EE19A7190070ADFCB24CF58C980BAABBF1EB45305F15852EE497A72D1E338AA91CF44
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                            • Instruction ID: 968ea090ea57439d934916100a42e081e4144f1e312078ddc892fc3721ce49e9
                            • Opcode Fuzzy Hash: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                            • Instruction Fuzzy Hash: 18C14A31E0421ACBCF14CF68D4905EEBBB2BF99314F25866AD8567B380D734A942CF95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B8E
                            • ShowWindow.USER32(?), ref: 00403BAB
                            • DestroyWindow.USER32 ref: 00403BBF
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BDB
                            • GetDlgItem.USER32(?,?), ref: 00403BFC
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C10
                            • IsWindowEnabled.USER32(00000000), ref: 00403C17
                            • GetDlgItem.USER32(?,00000001), ref: 00403CC5
                            • GetDlgItem.USER32(?,00000002), ref: 00403CCF
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403CE9
                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D3A
                            • GetDlgItem.USER32(?,00000003), ref: 00403DE0
                            • ShowWindow.USER32(00000000,?), ref: 00403E01
                            • EnableWindow.USER32(?,?), ref: 00403E13
                            • EnableWindow.USER32(?,?), ref: 00403E2E
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E44
                            • EnableMenuItem.USER32(00000000), ref: 00403E4B
                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E63
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E76
                            • lstrlenA.KERNEL32(0042A870,?,0042A870,00000000), ref: 00403EA0
                            • SetWindowTextA.USER32(?,0042A870), ref: 00403EAF
                            • ShowWindow.USER32(?,0000000A), ref: 00403FE3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID:
                            • API String ID: 184305955-0
                            • Opcode ID: 73a332412999680b2dcb521756cc8655f7b5c6597c26b8181da5b9882737dc52
                            • Instruction ID: 825bbfaa6b66e15a56cde4951677423d70b10f791e0768be12abaf391e468a8e
                            • Opcode Fuzzy Hash: 73a332412999680b2dcb521756cc8655f7b5c6597c26b8181da5b9882737dc52
                            • Instruction Fuzzy Hash: 80C19F71604205AFDB206F22EE45E2B3EBCFB4570AF40053EFA42B11E1CB7999429B1D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041FA
                            • GetDlgItem.USER32(00000000,000003E8), ref: 0040420E
                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040422C
                            • GetSysColor.USER32(?), ref: 0040423D
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040424C
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040425B
                            • lstrlenA.KERNEL32(?), ref: 0040425E
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040426D
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404282
                            • GetDlgItem.USER32(?,0000040A), ref: 004042E4
                            • SendMessageA.USER32(00000000), ref: 004042E7
                            • GetDlgItem.USER32(?,000003E8), ref: 00404312
                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404352
                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404361
                            • SetCursor.USER32(00000000), ref: 0040436A
                            • LoadCursorA.USER32(00000000,00007F00), ref: 00404380
                            • SetCursor.USER32(00000000), ref: 00404383
                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043AF
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043C3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: :A@$N$get
                            • API String ID: 3103080414-2868807659
                            • Opcode ID: cd245b479e67a0965af24715bd7e729d27bd81987a0dae74a39f742a14bba925
                            • Instruction ID: 4cc5751811e84191dd39768f0d3a0055f5535ab869bb222e46a2b56927204bf5
                            • Opcode Fuzzy Hash: cd245b479e67a0965af24715bd7e729d27bd81987a0dae74a39f742a14bba925
                            • Instruction Fuzzy Hash: DA6183B1A00205BFEB10AF61DD45F6A7B69EB84715F00413AFB05BA1D1C7B8A951CF98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,update Setup,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F$update Setup
                            • API String ID: 941294808-505284142
                            • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                            • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                            • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                            • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405D65,?,?), ref: 00405C05
                            • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C0E
                              • Part of subcall function 00405A63: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CBE,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A73
                              • Part of subcall function 00405A63: lstrlenA.KERNEL32(00000000,?,00000000,00405CBE,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AA5
                            • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C2B
                            • wsprintfA.USER32 ref: 00405C49
                            • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405C84
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405C93
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CCB
                            • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D21
                            • GlobalFree.KERNEL32(00000000), ref: 00405D32
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D39
                              • Part of subcall function 00405AFE: GetFileAttributesA.KERNEL32(00000003,00402D88,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,80000000,00000003), ref: 00405B02
                              • Part of subcall function 00405AFE: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B24
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %s=%s$[Rename]
                            • API String ID: 2171350718-1727408572
                            • Opcode ID: 19f304a619b6baa61da18707e398eef91e4d1c241cf3942778bb5909504f8d3d
                            • Instruction ID: 17f8f1309641d4637e2ed4fc5cbc189083b9795c86085c8cd532ee5919f79a85
                            • Opcode Fuzzy Hash: 19f304a619b6baa61da18707e398eef91e4d1c241cf3942778bb5909504f8d3d
                            • Instruction Fuzzy Hash: 61310131601B19ABD2206B65AD8DF6B3A5CDF45714F14053BBA01F62D2EA7CA8018EBD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetSystemDirectoryA.KERNEL32(get,00000400), ref: 004060B2
                            • GetWindowsDirectoryA.KERNEL32(get,00000400,?,0042A050,00000000,004050C4,0042A050,00000000), ref: 004060C5
                            • SHGetSpecialFolderLocation.SHELL32(004050C4,759223A0,?,0042A050,00000000,004050C4,0042A050,00000000), ref: 00406101
                            • SHGetPathFromIDListA.SHELL32(759223A0,get), ref: 0040610F
                            • CoTaskMemFree.OLE32(759223A0), ref: 0040611B
                            • lstrcatA.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040613F
                            • lstrlenA.KERNEL32(get,?,0042A050,00000000,004050C4,0042A050,00000000,00000000,0041EA28,759223A0), ref: 00406191
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$get
                            • API String ID: 717251189-1821354785
                            • Opcode ID: 93175b9e86ceeaf5bc26d2662ee9bcff77ced71dd0aab543063507f0a11e8a4f
                            • Instruction ID: 1b13e8ff18f2312f61c88a614d7ce51b6c0fc9f7833a06fa9902b6248b39176d
                            • Opcode Fuzzy Hash: 93175b9e86ceeaf5bc26d2662ee9bcff77ced71dd0aab543063507f0a11e8a4f
                            • Instruction Fuzzy Hash: D561F170A00105AEDF20AF24CC90BBB3BA5EB55314F56413FE903BA2D2C67D4962CB5E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00406227
                            • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406234
                            • CharNextA.USER32(?,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00406239
                            • CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00406249
                            Strings
                            • "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe", xrefs: 0040620B
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004061D0
                            • *?|<>/":, xrefs: 00406217
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-2654551402
                            • Opcode ID: 5f1665aab2a45dc98a0c2aad5c019af140aadccb050e4449eaa375ca2787231f
                            • Instruction ID: ed3a47555f86895cac8e455d85beb05a749fa7fcd8deb799c497f9efd275ca90
                            • Opcode Fuzzy Hash: 5f1665aab2a45dc98a0c2aad5c019af140aadccb050e4449eaa375ca2787231f
                            • Instruction Fuzzy Hash: D111E26180579029FB3226380C44B776F884F6A760F1900BFE8D2722C3CA7C5C62966E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 004040AA
                            • GetSysColor.USER32(00000000), ref: 004040C6
                            • SetTextColor.GDI32(?,00000000), ref: 004040D2
                            • SetBkMode.GDI32(?,?), ref: 004040DE
                            • GetSysColor.USER32(?), ref: 004040F1
                            • SetBkColor.GDI32(?,?), ref: 00404101
                            • DeleteObject.GDI32(?), ref: 0040411B
                            • CreateBrushIndirect.GDI32(?), ref: 00404125
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                            • Instruction ID: 2d9fb341b818c34885f35f6e6d755d1b55c6e7706bb7847a6dc6733995099f15
                            • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                            • Instruction Fuzzy Hash: 1A216F71500704ABCB219F68DE08A4BBBF8AF41714F048939EAD5F66A0C734E948CB64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(0042A050,00000000,0041EA28,759223A0,?,?,?,?,?,?,?,?,?,004030DC,00000000,?), ref: 004050C5
                            • lstrlenA.KERNEL32(004030DC,0042A050,00000000,0041EA28,759223A0,?,?,?,?,?,?,?,?,?,004030DC,00000000), ref: 004050D5
                            • lstrcatA.KERNEL32(0042A050,004030DC,004030DC,0042A050,00000000,0041EA28,759223A0), ref: 004050E8
                            • SetWindowTextA.USER32(0042A050,0042A050), ref: 004050FA
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405120
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513A
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405148
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                            • Instruction ID: 508789985144291932d060d6ef0b432b589b283746e8f0e3613f73f9cddaab2c
                            • Opcode Fuzzy Hash: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                            • Instruction Fuzzy Hash: 9E217A71A00518BFDB119FA5CD85EDFBFA9EB05354F14807AF944AA290C6398A418F98
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404972
                            • GetMessagePos.USER32 ref: 0040497A
                            • ScreenToClient.USER32(?,?), ref: 00404994
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049A6
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004049CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction ID: 403e93763916a0c69708d0661a5269b1e580af1e573dd698745729a1614bb606
                            • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction Fuzzy Hash: 02015EB190021DBAEB01DBA4DD85BFFBBFCAF55711F10412BBA50B61C0C7B499018BA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                            • MulDiv.KERNEL32(0000BDE8,00000064,0000BDEC), ref: 00402CA7
                            • wsprintfA.USER32 ref: 00402CB7
                            • SetWindowTextA.USER32(?,?), ref: 00402CC7
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD9
                            Strings
                            • verifying installer: %d%%, xrefs: 00402CB1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: 8cf66896cf3f33f8ea8d40d262e26d06426d7b5af9806429cf1dba26c1fd6b47
                            • Instruction ID: 537944924eabc97b3cccf86cf440a0916c3cc685b10ad000e4021125f5d30dc2
                            • Opcode Fuzzy Hash: 8cf66896cf3f33f8ea8d40d262e26d06426d7b5af9806429cf1dba26c1fd6b47
                            • Instruction Fuzzy Hash: 3401FF7164020DFBEF209F61DD09EEE37A9AB04305F008039FA06A92D0DBB999558F59
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                            • GlobalFree.KERNEL32(?), ref: 004027E5
                            • GlobalFree.KERNEL32(00000000), ref: 004027F8
                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: 6803d74f51fefc5aae55b065fac9c87e9e8d6a4e026ec4b13ab89996610ab644
                            • Instruction ID: 6644526d81fa5c7ff175c86addd85cc92bc24fd3ec06af29a2511a4f4fc8a5d3
                            • Opcode Fuzzy Hash: 6803d74f51fefc5aae55b065fac9c87e9e8d6a4e026ec4b13ab89996610ab644
                            • Instruction Fuzzy Hash: 3B21BC71800124BBDF216FA5DE89D9E7B79EF04324F10423AF924762E0CA784D418FA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDC.USER32(?), ref: 00401D98
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                            • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                            • CreateFontIndirectA.GDI32(0040B820), ref: 00401E1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID:
                            • API String ID: 3808545654-0
                            • Opcode ID: 308e053560ee70820e3614aee6e3ae82a2990e303a595f115dffdce8e5cbd147
                            • Instruction ID: e9269c0f41cd5a79e17a17131fa0488204b4df503fc5c3e11bd14e9e74a55962
                            • Opcode Fuzzy Hash: 308e053560ee70820e3614aee6e3ae82a2990e303a595f115dffdce8e5cbd147
                            • Instruction Fuzzy Hash: 24014072944344AEE7006BB4AE49BA97FE8EB15705F109439F141B61F2CB790405CF6D
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetDlgItem.USER32(?), ref: 00401D3F
                            • GetClientRect.USER32(00000000,?), ref: 00401D4C
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                            • DeleteObject.GDI32(00000000), ref: 00401D8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: e7b13135481585f1ae21f8f3a2a21f2ebc81ae0f190e6cb519dc2edadbd9593c
                            • Instruction ID: b94dd0b2fc2efe961c915ac3dbaedcbaa59703da1128c811c259d0727350af9e
                            • Opcode Fuzzy Hash: e7b13135481585f1ae21f8f3a2a21f2ebc81ae0f190e6cb519dc2edadbd9593c
                            • Instruction Fuzzy Hash: 6EF0FFB2600515BFDB00EBA4DE88DAFB7BCEB44301B04447AF645F2191CA748D018B38
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404768,000000DF,00000000,00000400,?), ref: 004048EB
                            • wsprintfA.USER32 ref: 004048F3
                            • SetDlgItemTextA.USER32(?,0042A870), ref: 00404906
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: fc360b60deb29158253d5225dc841659dab03716f0da90b14001ba2338fc6a71
                            • Instruction ID: 46e1028d5dd9cf3fa3a12b124fa319e283dc00677a7b855ac62dacd231200cde
                            • Opcode Fuzzy Hash: fc360b60deb29158253d5225dc841659dab03716f0da90b14001ba2338fc6a71
                            • Instruction Fuzzy Hash: 8D11E477A041282BEB0075699C41EBF3298DB82374F24463BFE65F21D1E979CC1246E9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 8c877d5979cff4b3ce41adc99c27d6fc77d82e5cc3f5856b61787971cd0c7bbc
                            • Instruction ID: bdc01a124477b6dd133b62af0939e03034df0dda3ad70936a50ebcebbcd9d6cc
                            • Opcode Fuzzy Hash: 8c877d5979cff4b3ce41adc99c27d6fc77d82e5cc3f5856b61787971cd0c7bbc
                            • Instruction Fuzzy Hash: 9F218F71A44209BEEB15DFA5D946AED7BB0EB84304F14803EF505F61D1DA7889408F28
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031DE,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 00405903
                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031DE,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403405,?,00000006,00000008,0000000A), ref: 0040590C
                            • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 0040591D
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004058FD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-823278215
                            • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                            • Instruction ID: 647ad7e742d71b16062aa4f61d1124f0b3f0fcedfae467302285f0529c6cb9e2
                            • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                            • Instruction Fuzzy Hash: 46D0C9A2606A317AD21227159C09EDB6A4CCF57755B054076F640B61A1CA7C4D428BFE
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                            • RegCloseKey.ADVAPI32(?), ref: 00402C22
                            • RegCloseKey.ADVAPI32(?), ref: 00402C43
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Close$Enum
                            • String ID:
                            • API String ID: 464197530-0
                            • Opcode ID: 11be2661f8599cd0237f1c1554e4f8b4188825d64962de0b1740bf644c97f38e
                            • Instruction ID: b62f4967d327be975f6bbb281b4945b449d6b6e398a7fc8ef6fb9c274ae0afe8
                            • Opcode Fuzzy Hash: 11be2661f8599cd0237f1c1554e4f8b4188825d64962de0b1740bf644c97f38e
                            • Instruction Fuzzy Hash: 9A118832500109BBEF01AF91CF09B9E3B79EF08341F104036BA05B50E0E7B4EE52AB68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CharNextA.USER32(?,?,C:\,?,00405A02,C:\,C:\,75923410,?,C:\Users\user\AppData\Local\Temp\,0040574D,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059A4
                            • CharNextA.USER32(00000000), ref: 004059A9
                            • CharNextA.USER32(00000000), ref: 004059BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharNext
                            • String ID: C:\
                            • API String ID: 3213498283-3404278061
                            • Opcode ID: 6f1ffd314258f60c9d8d37a97cd5dc7cb97b0114338afd6930da08174d9d3dc4
                            • Instruction ID: 692bca14cad493fa5f8fffeffcf9af39aa377604f3823295436d19c4138fc52d
                            • Opcode Fuzzy Hash: 6f1ffd314258f60c9d8d37a97cd5dc7cb97b0114338afd6930da08174d9d3dc4
                            • Instruction Fuzzy Hash: CDF0C2E1918F50ABFB3252245C41B6B5F9CCB56374F04047BE240672C2C27858408B9A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • DestroyWindow.USER32(00000000,00000000,00402EC4,00000001), ref: 00402CF7
                            • GetTickCount.KERNEL32 ref: 00402D15
                            • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D32
                            • ShowWindow.USER32(00000000,00000005), ref: 00402D40
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 2469aab9b0bab78131693435c259bb338fdfc1179cff7f610c16a2f3c60769c5
                            • Instruction ID: 5343e4f3fd542578671bd54a8d6f819db7b5394acccd132b40ed42660498aa91
                            • Opcode Fuzzy Hash: 2469aab9b0bab78131693435c259bb338fdfc1179cff7f610c16a2f3c60769c5
                            • Instruction Fuzzy Hash: 01F05430601521EBC7207F24FE8CA8F7A64BB08B11791047AF445B21F4DBB448C28B9C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • IsWindowVisible.USER32(?), ref: 0040502F
                            • CallWindowProcA.USER32(?,?,?,?), ref: 00405080
                              • Part of subcall function 00404072: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00404084
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 0b5703a8dab1bd1bd7dd9e2c337de487c6e053b4983eba3ecfb903a9c205ce24
                            • Instruction ID: 2f0027df7ddfe28b71d6e39f600ecebaf2ba5c74aec8f2e947ae9809186c917a
                            • Opcode Fuzzy Hash: 0b5703a8dab1bd1bd7dd9e2c337de487c6e053b4983eba3ecfb903a9c205ce24
                            • Instruction Fuzzy Hash: 48017171500609ABDF205F51DD80E6F3B65EB84754F14403BFA01751D2C77A8CA29F9A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,get,0042A050,?,?,?,00000002,get,?,00406090,80000002), ref: 00405E92
                            • RegCloseKey.ADVAPI32(?,?,00406090,80000002,Software\Microsoft\Windows\CurrentVersion,get,get,get,?,0042A050), ref: 00405E9D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: get
                            • API String ID: 3356406503-4248514160
                            • Opcode ID: 792f73651c5f0961c7d778f0fa8b648c5274768340d5a4a072e3937443cccb1f
                            • Instruction ID: 9bec2c93df88531f10cf132d6bbbb6393b4a4aad9e102c5e2669e285c315f56d
                            • Opcode Fuzzy Hash: 792f73651c5f0961c7d778f0fa8b648c5274768340d5a4a072e3937443cccb1f
                            • Instruction Fuzzy Hash: B7015A72500619ABEF228F61CD09FDB3BACEF55365F00802AF955A2191D378DA54CBA8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 0040562D
                            • CloseHandle.KERNEL32(?), ref: 0040563A
                            Strings
                            • Error launching installer, xrefs: 00405617
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                            • Instruction ID: a14d50d96640d218925096829ca07d1800dc2b789f456133151d87fd2ad2a836
                            • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                            • Instruction Fuzzy Hash: 9EE046F0640209BFEB109FA0ED49F7F7AACEB00704F404921BD00F2290E67499088A7C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FreeLibrary.KERNEL32(?,75923410,00000000,C:\Users\user\AppData\Local\Temp\,004036F8,00403512,?,?,00000006,00000008,0000000A), ref: 0040373A
                            • GlobalFree.KERNEL32(?), ref: 00403741
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403720
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Free$GlobalLibrary
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 1100898210-823278215
                            • Opcode ID: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                            • Instruction ID: 7d8ce370987dd57b7bf148727d206b09ac62311aee63c146eb442539f55f5a8e
                            • Opcode Fuzzy Hash: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                            • Instruction Fuzzy Hash: 39E0C27391212097C7313F54EE0871ABBA86F46B22F0A403AE8407B26487745C428BCC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DB4,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,80000000,00000003), ref: 0040594A
                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DB4,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.15071.2577.exe,80000000,00000003), ref: 00405958
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-1246513382
                            • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                            • Instruction ID: 9e2646df26482555437471894173605ef17f2c9d125cfcd2b42401f98a5df656
                            • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                            • Instruction Fuzzy Hash: D6D0C9A240DDB1AEE70363249C04B9F6A88DF17710F0944A6E180B61A5C77C4D828BAD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CBE,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A73
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405A8B
                            • CharNextA.USER32(00000000,?,00000000,00405CBE,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A9C
                            • lstrlenA.KERNEL32(00000000,?,00000000,00405CBE,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AA5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1991630163.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1991618391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991641830.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000415000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991653035.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1991732596.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                            • Instruction ID: de8867e187cffd76a1833f018909c3af52f45fcf8c0597c8515af2ce59788131
                            • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                            • Instruction Fuzzy Hash: F5F0C231201818AFCB02DBA4CD80D9EBBA8EF46350B2540B9E840F7211D774DE019FA9
                            Uniqueness

                            Uniqueness Score: -1.00%