Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aMfizaMilo.exe

Overview

General Information

Sample name:aMfizaMilo.exe
renamed because original name is a hash value
Original sample name:a7d2ea641dbc8e50000e6b42c9cca200fa25d5e37ddd1857eb489795ab5564ee.exe
Analysis ID:1466841
MD5:95dc64015aa43a27412f7ff0979c5b87
SHA1:bde0ae97f4f98c0dd8a0833702ff073befbec268
SHA256:a7d2ea641dbc8e50000e6b42c9cca200fa25d5e37ddd1857eb489795ab5564ee
Tags:exeGuLoader
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Sample file is different than original file name gathered from version info
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • aMfizaMilo.exe (PID: 3536 cmdline: "C:\Users\user\Desktop\aMfizaMilo.exe" MD5: 95DC64015AA43A27412F7FF0979C5B87)
    • aMfizaMilo.exe (PID: 2340 cmdline: "C:\Users\user\Desktop\aMfizaMilo.exe" MD5: 95DC64015AA43A27412F7FF0979C5B87)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3852059916.00000000021F6000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.3855065668.0000000005546000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: aMfizaMilo.exe PID: 3536JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\aMfizaMilo.exe, ProcessId: 3536, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers\keelhauls.scr
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\aMfizaMilo.exe, ProcessId: 3536, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers\keelhauls.scr
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: aMfizaMilo.exeReversingLabs: Detection: 57%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: aMfizaMilo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: aMfizaMilo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,6_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_004026F8 FindFirstFileA,6_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_0040639C FindFirstFileA,FindClose,6_2_0040639C
        Source: aMfizaMilo.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: aMfizaMilo.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_004052FE
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,6_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Windows\resources\0809Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004067250_2_00406725
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00404B3D0_2_00404B3D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_004067256_2_00406725
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_00404B3D6_2_00404B3D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: String function: 00402AC1 appears 48 times
        Source: aMfizaMilo.exe, 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestrabismical.exe0 vs aMfizaMilo.exe
        Source: aMfizaMilo.exe, 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestrabismical.exe0 vs aMfizaMilo.exe
        Source: aMfizaMilo.exeBinary or memory string: OriginalFilenamestrabismical.exe0 vs aMfizaMilo.exe
        Source: aMfizaMilo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal76.troj.evad.winEXE@3/12@0/0
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,6_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004045CA
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004020CB LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_004020CB
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenesJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Users\user\AppData\Local\Temp\nsf597F.tmpJump to behavior
        Source: aMfizaMilo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: aMfizaMilo.exeReversingLabs: Detection: 57%
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile read: C:\Users\user\Desktop\aMfizaMilo.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: aMfizaMilo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: aMfizaMilo.exe PID: 3536, type: MEMORYSTR
        Source: Yara matchFile source: 00000006.00000002.3852059916.00000000021F6000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3855065668.0000000005546000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI/Special instruction interceptor: Address: 5C9B9B6
        Source: C:\Users\user\Desktop\aMfizaMilo.exeRDTSC instruction interceptor: First address: 5C5EC99 second address: 5C5EC99 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F2F70BD2DC5h 0x00000006 inc ebp 0x00000007 cmp dx, cx 0x0000000a inc ebx 0x0000000b cmp cl, bl 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\aMfizaMilo.exeRDTSC instruction interceptor: First address: 290EC99 second address: 290EC99 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F2F713FEDC5h 0x00000006 inc ebp 0x00000007 cmp dx, cx 0x0000000a inc ebx 0x0000000b cmp cl, bl 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\aMfizaMilo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,6_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_004026F8 FindFirstFileA,6_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 6_2_0040639C FindFirstFileA,FindClose,6_2_0040639C
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI call chain: ExitProcess graph end nodegraph_0-4286
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI call chain: ExitProcess graph end nodegraph_0-4475
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00403146 GetTickCount,SetFilePointer,SetFilePointer,LdrInitializeThunk,0_2_00403146
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        11
        Masquerading
        OS Credential Dumping2
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
        Process Injection
        1
        Access Token Manipulation
        LSASS Memory3
        File and Directory Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Junk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        11
        Process Injection
        Security Account Manager23
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Deobfuscate/Decode Files or Information
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
        Obfuscated Files or Information
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        aMfizaMilo.exe58%ReversingLabsWin32.Trojan.GuLoader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_ErroraMfizaMilo.exefalse
        • URL Reputation: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErroraMfizaMilo.exefalse
        • URL Reputation: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1466841
        Start date and time:2024-07-03 13:52:06 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 43s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:aMfizaMilo.exe
        renamed because original name is a hash value
        Original Sample Name:a7d2ea641dbc8e50000e6b42c9cca200fa25d5e37ddd1857eb489795ab5564ee.exe
        Detection:MAL
        Classification:mal76.troj.evad.winEXE@3/12@0/0
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 97%
        • Number of executed functions: 61
        • Number of non-executed functions: 67
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target aMfizaMilo.exe, PID 2340 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: aMfizaMilo.exe
        No simulations
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dllOzb8aojWew.exeGet hashmaliciousGuLoaderBrowse
          Documents.com.exeGet hashmaliciousGuLoaderBrowse
            Documents.com.exeGet hashmaliciousGuLoaderBrowse
              27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
                27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
                  Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
                    Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
                      Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
                        Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
                          RFQ#NEWORDER-SP-21-091-003-ASIA SUPPLY.comGet hashmaliciousRemcos, GuLoaderBrowse
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):836396
                            Entropy (8bit):0.29759115823756915
                            Encrypted:false
                            SSDEEP:768:ONjfRwbxYsn1KxrM/MRos6Yumut+ud9j4f7lzZnMkviwCdR/S9krIXLtZkCoVf/1:Q/5y
                            MD5:6593DE223564535CE11D13BFB74348CA
                            SHA1:5D85AF6A3877470118DDAC318A131C7EB2498BB2
                            SHA-256:A57CB464F48B61E87ED20832F2D6EAE93C2669BB13850CB6186248E9B597364C
                            SHA-512:F0B85A3F75268CB4B08FF7FC18A631ACC4C1D9E8ACA804B9ED8DFC186789BF930467F1C2AE2DCC769AC200557D4FF01ABDA80EA17CE622488D56C264D2941E3F
                            Malicious:false
                            Reputation:low
                            Preview:..................................................................................................................................?......................................................................................................................................................................................................................................................................................................................................................................................................................................e.......................................................................................................................................................................................................k...................................................S.......................................................................................................................X..........................................................................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):21145
                            Entropy (8bit):4.497344434521278
                            Encrypted:false
                            SSDEEP:384:lUOZNanrJF8+6XhYz5zYHsP9R/wWb1ml2EM:JiT8+MadPEWJOc
                            MD5:B326CB8D03A7AF828A6347ADDCB5A9D1
                            SHA1:1F7F57AA5763B004D3198597EB80208AA0E93570
                            SHA-256:A9CD23EB35C039440BDE74A206AC3613B52FD667AA1484125587E61C79912DFC
                            SHA-512:57999DE9A99336DB3A7B9AFF3C69295BDA2514374187E0B0C0082F21B68101530B17A0D5A23157584303C505F82C3D441360B91649A39EC2A20CA6D890E8D126
                            Malicious:false
                            Reputation:low
                            Preview:...........___.................}.a.LL.._........5..MM.........A.................rrrrrrrr.]]....k...e...r...n...e...l...3...2...:...:...C...r...e...a...t...e...F...i.\.l..%e...A.bb(...m... ..,r...4.OO ...,... ..Bi... ...0...x...8.J.0...0..C0.z.0...0...0...0...,... ...i... ...0.h.,... ...p... ...0...,... ...i... ...4...,... ...i... ...0...x..A8...0...,... ...i... ...0..Z)...i.......r..a8...q...k...e...r...n...e...l...3...2.. :...:...S..7e...t...F..ii.Z.l..de...P...o...i...n.b.t...e..=r...(...i... .UUr...8...,... ...i... ...2...3...0...1...2... ..$,... ..8i... ...0...,...i.=. .."0...)...i.......r...4...q...k...e...r.'.n..%e...l...3...2...:...:..zV.JJi...r...t...u...a...l...A...l...l...o...c..O(...i... ...0...,...i... ...4...3...6...7.**5.((6...4...8...,... .11i... ...0.11x..k3...0...0.c.0...,... ...i... ...0...x..{4...0...)...p.......r.@.2...q...k...e...r...n..Xe...l...3..X2...:.o.:...R...e...a...d...F...i...l...e...(...i... .S.r...8...,... ...i... ...r...2...,.1. .%.i... ...4...3...6...7
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1089926
                            Entropy (8bit):0.29789121998864304
                            Encrypted:false
                            SSDEEP:768:DfIbQMnX/cgMWndUtQ//KuGQ+4xRoQoezjVn20Ka17J6T0vbXHtPSeySgSJSejnK:VIbm
                            MD5:7978BF27082616FAADE55B22394BBDDC
                            SHA1:3CB41F03B1CD775F7F6BC9B95944854DDA87BF36
                            SHA-256:B88A13EB0EEDB9BE6E1F809D0B8A55979186DB208858FEDCE5A59B28556B248B
                            SHA-512:9A734B8285C96706C434AEDF2ABF6666E82EC257DEFAB74213C50B18A5C7B23B3A48D76FE64E4CC6446CC460095CEA3F37D8029FA28B9198F4A371BA1C23922B
                            Malicious:false
                            Reputation:low
                            Preview:............................................................................................................................................................................................................................................................................................................................................O................................................................................................................../.....................................................................................M............................................................................................................................................................................................................................................................................................................0.....................................................................................................................................................................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1078378
                            Entropy (8bit):0.29937849286877016
                            Encrypted:false
                            SSDEEP:768:N9lotXK6U6HA/zmsIxzvraRwfj+iMbmwrhg2hnwjYBm2GOP9bsWZafCJL6Ir7wxG:QRPMLzJ
                            MD5:87A3CE82A211E6022D7145C99EEF5EDC
                            SHA1:D2AA5DAEF3272ACDEE40657353EBB0BA94728E8D
                            SHA-256:66BF6C84307739696EB18D632B6A34755375E61F3C612DC273C7F8F25FCAD938
                            SHA-512:66F2BC1530F6D187749486C7305F069D67964EF5427A6A59F2DC081469F5D608C6E0D2C30EDEF70A6A79E6386BE1528AE2B8725BA704E2D3CF8B2F303D8EB1CF
                            Malicious:false
                            Reputation:low
                            Preview:..................................................................................{.................................................................................................................................................................v...................................................................................................................................................<..................................................................................................................................................................................................s...............................................................................................................................................................................Y.......................................................................h..........................E..........................................................f..............................................................................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):442
                            Entropy (8bit):4.257547597458778
                            Encrypted:false
                            SSDEEP:12:cITDesyfMA34EmHSFoYHGzqDcnuV/HGgPF7Rl6s:LoMhcozqDV/HzPF+s
                            MD5:87308607BBEFDD32639F5BCAD963B8C2
                            SHA1:14A3196B8301243120BD7F9248C5949D718B4DEA
                            SHA-256:A71BD44CA8EFDA96BA1083D1D36FC2148592CA881CFF674C71B7742A1866B012
                            SHA-512:9019036C6976F9A8BA0F6D5FDE538FFA69C537A320CF09758E2CEB9012F4C106E4D09B15248CA0A695DC7960FFBBF500FF21BD3A17EBD37FE3DE13A0BBC8EA5E
                            Malicious:false
                            Reputation:low
                            Preview:douceurs aflggere dryfarmer telefonvagts barytosulphate unovertaken ligustres snydeblusens foersteaarsstuderende konserverendes..foresleeve tricks datastyret diadermic.statsforfatningsretten drfljenes lavritz resurged isodrosotherm redocked ekkoer.dvblind prstevikariaternes infeminine lvs dannebrogsordenens,atocia gummaking paaligningernes visard longueurs overklasselg afviste..gydningen svovlsures pillmaking treasonous jibhead sphygmoid,
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1196385
                            Entropy (8bit):0.29404357461455993
                            Encrypted:false
                            SSDEEP:768:zrTEDgAwUGxcEEBSF2XVHcg/62u6BEqlktC9le+FplzUtaPQVPKtoQFrqFrepOde:TM2gnM9
                            MD5:11825DAB7ECEA24188448D6DE7D605A5
                            SHA1:90CC6EEC53823CDB2E1946583042699B42C84BFF
                            SHA-256:E9F3CA77C307A76C115171B367B540D2615F30636A16EE986C852AEF5EAB6409
                            SHA-512:6F0F808DE0DADD0F8E94DF72E1A85828F0BD8E14FB8F4300614901A17C260AF55CFE33EC473FEF34663E8B069BF19306EB32D38E39E60149BD85D83D14C23749
                            Malicious:false
                            Reputation:low
                            Preview:.................................g...............................................................................................................................................................................................w..................................................................................0..........................................................................................................................................................................n......................................................?....................................................................................................................................................................................................................................................................................................................................................................................................................................................|..........._................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):714538
                            Entropy (8bit):0.297157822096001
                            Encrypted:false
                            SSDEEP:768:eLtWEAnNzz6fiBH4r4D2EBct2GaDNHpDe9SM1hon+wFniYgoZhgBy9:Q
                            MD5:17DF408E712C3359E4B58F95E4529F16
                            SHA1:75203C6B467A1174B41DFEFE3795A9B87331808E
                            SHA-256:35D50D71AFA6B8169123458A8232CDE1E3D96E3A0E6734045714192B0930D1AA
                            SHA-512:7FA7600651CE103DD3F5143036E5EE6B5B3262555D331761BD426898990A6B314E25A018E4B16B395E86E0A023B24DF3796744860E6478EFBFA190EBADBC4253
                            Malicious:false
                            Reputation:low
                            Preview:..............................................................................................!.............................................................................................................................................................................................................................;.............................................................................................................................................................................................................0............................................................................Q.....................................................................................................................................................................e................................................................................................................................................................................e.........................................................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):279429
                            Entropy (8bit):7.440589404691988
                            Encrypted:false
                            SSDEEP:6144:EBIUbXTygOPJfDSn/ixkc0Ll9yCnYV8bws3fy4B:XkXOZxbakkc0Ll9QsY4B
                            MD5:F8863D882553A6EFB3CB6111E7B13E3B
                            SHA1:C1079473474483560740FD299E53E9D4F7394B2E
                            SHA-256:7E7CD7AE34B03CE558793E91FAEBA688E1D6BFD8753FAFF3D60F0BFDCAFB4E75
                            SHA-512:8D4951D30E3774E638CB93D24AD40B0FB738F08939CF30F1D60626277C90F5318F9FA2C5B322BE12DBFBB8E7CB869D03D01138A112EBB1C041D3E533A10E1B32
                            Malicious:false
                            Preview:...+......:.....666.QQ.........u.........)........................8............ffffff.&&.......``...88...iiii......888............G............................................$$......\.......ww..................1..JJ...........""...........K.......................................ccc..............[[...........................kk........j......9.....hh...........J..........N.iii...........0000......{{.<.........5..........W...........R...!!..............................".5.......<<<<............................................1..........-..........o.,,,,,,...\.......&&...NN..........~.U........)))))))))...xx.....yy...................7..J.....;........e........,,,............................1........................D.....R.....................ww.......`.....ff.6......u....................]].......666...............BB..S.m........Y...?......GG.................>>>...........gg..m.2.........................IIII.......[[..............................."................b.::. ........H.....~~...T
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):49
                            Entropy (8bit):4.75216571132969
                            Encrypted:false
                            SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                            MD5:797DA95245047A54F125FBF3B19FA295
                            SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                            SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                            SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                            Malicious:false
                            Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):5238870
                            Entropy (8bit):0.9277389025480162
                            Encrypted:false
                            SSDEEP:6144:4gBIUbXTygOPJfDSn/ixkc0Ll9yCnYV8bws3fy4f0UEgjq3u:CkXOZxbakkc0Ll9QsY4nU3u
                            MD5:657AD2F273D0DB7DEF109D6E619F636A
                            SHA1:0CBB1516021BA9F766AC91A4491DC90488320630
                            SHA-256:5E46088DC84000ADF1C2E81841FCE77430A3D87482D51CAE08DC08C1BDD19B74
                            SHA-512:9691F6188FA7D10AAB4282B434D6F6F87EFAA4487D27367481C180B318CF0922E9F28B227375D983CA204689105D547ADB8200EBD14770E61B24A83EA9C23166
                            Malicious:false
                            Preview:.*......,................................)......x*..........................................................................................................................................................................................................................................J...f...............j...........................................................................................................................................;...#.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.76781505116372
                            Encrypted:false
                            SSDEEP:192:MPtkumJX7zBE2kGwfy9S9VkPsFQ1Mx1c:97O2k5q9wA1Mxa
                            MD5:55A26D7800446F1373056064C64C3CE8
                            SHA1:80256857E9A0A9C8897923B717F3435295A76002
                            SHA-256:904FD5481D72F4E03B01A455F848DEDD095D0FB17E33608E0D849F5196FB6FF8
                            SHA-512:04B8AB7A85C26F188C0A06F524488D6F2AC2884BF107C860C82E94AE12C3859F825133D78338FD2B594DFC48F7DC9888AE76FEE786C6252A5C77C88755128A5B
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                            • Filename: Documents.com.exe, Detection: malicious, Browse
                            • Filename: Documents.com.exe, Detection: malicious, Browse
                            • Filename: 27062024-322copy.exe, Detection: malicious, Browse
                            • Filename: 27062024-322copy.exe, Detection: malicious, Browse
                            • Filename: Jailkeeper.bat.exe, Detection: malicious, Browse
                            • Filename: Order 000293884849900.bat.exe, Detection: malicious, Browse
                            • Filename: Jailkeeper.bat.exe, Detection: malicious, Browse
                            • Filename: Order 000293884849900.bat.exe, Detection: malicious, Browse
                            • Filename: RFQ#NEWORDER-SP-21-091-003-ASIA SUPPLY.com, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L...R..Y...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..^....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\aMfizaMilo.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):25
                            Entropy (8bit):4.163856189774724
                            Encrypted:false
                            SSDEEP:3:+gMn:8
                            MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                            SHA1:61DC848DD725DB72746E332D040A032C726C9816
                            SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                            SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                            Malicious:false
                            Preview:[Caps]..Setting=Enabled..
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.2599762726726125
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:aMfizaMilo.exe
                            File size:891'654 bytes
                            MD5:95dc64015aa43a27412f7ff0979c5b87
                            SHA1:bde0ae97f4f98c0dd8a0833702ff073befbec268
                            SHA256:a7d2ea641dbc8e50000e6b42c9cca200fa25d5e37ddd1857eb489795ab5564ee
                            SHA512:450a8ba7eb3c3178b5567b692d55518d393af5d971bb22ab13e1c9078c9ea389f1a9e28d391a8882ef8d1b99972ec27af64fa2c7aa8fa79c9c0d2423d0176d10
                            SSDEEP:12288:XcIjd3nQIQsk3na+QiLPTEYLwdLh5d2tqnXQJgcCp8vGiVIkk84n5QWrV:XcIjUna3iLtwb/2tWXMi2rq7nHB
                            TLSH:FA15F1BF236B981EC49065B609F1D108A6F04E4E15BD8A476A72FFA8FE7C7C07C89151
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...s..Y.................b.........
                            Icon Hash:070f4b69d5300d13
                            Entrypoint:0x40330d
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x597FCC73 [Tue Aug 1 00:33:55 2017 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:57e98d9a5a72c8d7ad8fb7a6a58b3daf
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 0040A130h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [004080A8h]
                            call dword ptr [004080A4h]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042472Ch], eax
                            je 00007F2F70B5CEE3h
                            push ebx
                            call 00007F2F70B5FFB2h
                            cmp eax, ebx
                            je 00007F2F70B5CED9h
                            push 00000C00h
                            call eax
                            mov esi, 00408298h
                            push esi
                            call 00007F2F70B5FF2Eh
                            push esi
                            call dword ptr [004080A0h]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007F2F70B5CEBDh
                            push 0000000Ah
                            call 00007F2F70B5FF86h
                            push 00000008h
                            call 00007F2F70B5FF7Fh
                            push 00000006h
                            mov dword ptr [00424724h], eax
                            call 00007F2F70B5FF73h
                            cmp eax, ebx
                            je 00007F2F70B5CEE1h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F2F70B5CED9h
                            or byte ptr [0042472Fh], 00000040h
                            push ebp
                            call dword ptr [00408044h]
                            push ebx
                            call dword ptr [00408288h]
                            mov dword ptr [004247F8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 0041FCF0h
                            call dword ptr [00408178h]
                            push 0040A1ECh
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000x5aa38.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x603c0x6200029c8031e2fb36630bb7ccb6d1d379b5False0.6572464923469388data6.39361655287636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x12480x1400421f9404c16c75fa4bc7d37da19b3076False0.4287109375data5.044261339836676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x1a8380x400c93d53142ea782e156ddc6acebdf883dFalse0.6455078125data5.223134318413766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x250000x1c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x410000x5aa380x5ac0036138a89abeb35667330457e2be0a675False0.3329620781680441data5.566457386793811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x414780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.21799641980057402
                            RT_ICON0x834a00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.6193806932450018
                            RT_ICON0x93cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.6783195020746888
                            RT_ICON0x962700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.7033302063789869
                            RT_ICON0x973180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.7731876332622601
                            RT_ICON0x981c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.7274590163934426
                            RT_ICON0x98b480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.8285198555956679
                            RT_ICON0x993f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishUnited States0.8323732718894009
                            RT_ICON0x99ab80x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.5115853658536585
                            RT_ICON0x9a1200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6777456647398844
                            RT_ICON0x9a6880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.7854609929078015
                            RT_ICON0x9aaf00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.553763440860215
                            RT_ICON0x9add80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 0EnglishUnited States0.6065573770491803
                            RT_ICON0x9afc00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.6587837837837838
                            RT_DIALOG0x9b0e80x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x9b1e80x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x9b3080xc4dataEnglishUnited States0.5918367346938775
                            RT_DIALOG0x9b3d00x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x9b4300xcadataEnglishUnited States0.5792079207920792
                            RT_VERSION0x9b5000x1f4dataEnglishUnited States0.518
                            RT_MANIFEST0x9b6f80x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                            DLLImport
                            KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetCurrentDirectoryA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                            USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:07:53:00
                            Start date:03/07/2024
                            Path:C:\Users\user\Desktop\aMfizaMilo.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\aMfizaMilo.exe"
                            Imagebase:0x400000
                            File size:891'654 bytes
                            MD5 hash:95DC64015AA43A27412F7FF0979C5B87
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3855065668.0000000005546000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:6
                            Start time:07:56:58
                            Start date:03/07/2024
                            Path:C:\Users\user\Desktop\aMfizaMilo.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\aMfizaMilo.exe"
                            Imagebase:0x400000
                            File size:891'654 bytes
                            MD5 hash:95DC64015AA43A27412F7FF0979C5B87
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.3852059916.00000000021F6000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:23.9%
                              Dynamic/Decrypted Code Coverage:13.8%
                              Signature Coverage:20.9%
                              Total number of Nodes:1519
                              Total number of Limit Nodes:49
                              execution_graph 5147 10001000 5150 1000101b 5147->5150 5157 100014bb 5150->5157 5152 10001020 5153 10001024 5152->5153 5154 10001027 GlobalAlloc 5152->5154 5155 100014e2 3 API calls 5153->5155 5154->5153 5156 10001019 5155->5156 5159 100014c1 5157->5159 5158 100014c7 5158->5152 5159->5158 5160 100014d3 GlobalFree 5159->5160 5160->5152 4028 4025c4 4029 402a9f 17 API calls 4028->4029 4032 4025ce 4029->4032 4030 40263c 4032->4030 4033 40263e 4032->4033 4035 40264e 4032->4035 4037 405caa ReadFile 4032->4037 4039 405ff7 wsprintfA 4033->4039 4035->4030 4036 402664 SetFilePointer 4035->4036 4036->4030 4038 405cc8 4037->4038 4038->4032 4039->4030 4068 402245 4069 402ac1 17 API calls 4068->4069 4070 40224b 4069->4070 4071 402ac1 17 API calls 4070->4071 4072 402254 4071->4072 4073 402ac1 17 API calls 4072->4073 4074 40225d 4073->4074 4083 40639c FindFirstFileA 4074->4083 4077 402277 lstrlenA lstrlenA 4079 4051c0 24 API calls 4077->4079 4080 4022b3 SHFileOperationA 4079->4080 4081 40226a 4080->4081 4082 402272 4080->4082 4086 4051c0 4081->4086 4084 4063b2 FindClose 4083->4084 4085 402266 4083->4085 4084->4085 4085->4077 4085->4081 4087 4051db 4086->4087 4096 40527e 4086->4096 4088 4051f8 lstrlenA 4087->4088 4089 4060bb 17 API calls 4087->4089 4090 405221 4088->4090 4091 405206 lstrlenA 4088->4091 4089->4088 4092 405234 4090->4092 4093 405227 SetWindowTextA 4090->4093 4094 405218 lstrcatA 4091->4094 4091->4096 4095 40523a SendMessageA SendMessageA SendMessageA 4092->4095 4092->4096 4093->4092 4094->4090 4095->4096 4096->4082 5168 4028c5 5169 402a9f 17 API calls 5168->5169 5170 4028cb 5169->5170 5171 402900 5170->5171 5173 402716 5170->5173 5174 4028dd 5170->5174 5172 4060bb 17 API calls 5171->5172 5171->5173 5172->5173 5174->5173 5176 405ff7 wsprintfA 5174->5176 5176->5173 4097 401746 4098 402ac1 17 API calls 4097->4098 4099 40174d 4098->4099 4103 405c61 4099->4103 4101 401754 4102 405c61 2 API calls 4101->4102 4102->4101 4104 405c6c GetTickCount GetTempFileNameA 4103->4104 4105 405c9d 4104->4105 4106 405c99 4104->4106 4105->4101 4106->4104 4106->4105 5177 4022c7 5178 4022e1 5177->5178 5179 4022ce 5177->5179 5180 4060bb 17 API calls 5179->5180 5181 4022db 5180->5181 5182 4057b5 MessageBoxIndirectA 5181->5182 5182->5178 5183 401947 5184 402ac1 17 API calls 5183->5184 5185 40194e lstrlenA 5184->5185 5186 402577 5185->5186 4214 10002709 4215 10002759 4214->4215 4216 10002719 VirtualProtect 4214->4216 4216->4215 5190 4045ca 5191 4045f6 5190->5191 5192 404607 5190->5192 5251 405799 GetDlgItemTextA 5191->5251 5193 404613 GetDlgItem 5192->5193 5200 404672 5192->5200 5195 404627 5193->5195 5199 40463b SetWindowTextA 5195->5199 5203 405aca 4 API calls 5195->5203 5196 404756 5249 404900 5196->5249 5253 405799 GetDlgItemTextA 5196->5253 5197 404601 5198 406303 5 API calls 5197->5198 5198->5192 5204 40415a 18 API calls 5199->5204 5200->5196 5205 4060bb 17 API calls 5200->5205 5200->5249 5202 4041c1 8 API calls 5207 404914 5202->5207 5208 404631 5203->5208 5209 404657 5204->5209 5210 4046e6 SHBrowseForFolderA 5205->5210 5206 404786 5211 405b1f 18 API calls 5206->5211 5208->5199 5215 405a31 3 API calls 5208->5215 5212 40415a 18 API calls 5209->5212 5210->5196 5213 4046fe CoTaskMemFree 5210->5213 5214 40478c 5211->5214 5216 404665 5212->5216 5217 405a31 3 API calls 5213->5217 5254 406099 lstrcpynA 5214->5254 5215->5199 5252 40418f SendMessageA 5216->5252 5219 40470b 5217->5219 5222 404742 SetDlgItemTextA 5219->5222 5226 4060bb 17 API calls 5219->5226 5221 40466b 5225 406431 5 API calls 5221->5225 5222->5196 5223 4047a3 5224 406431 5 API calls 5223->5224 5232 4047aa 5224->5232 5225->5200 5227 40472a lstrcmpiA 5226->5227 5227->5222 5229 40473b lstrcatA 5227->5229 5228 4047e6 5255 406099 lstrcpynA 5228->5255 5229->5222 5231 4047ed 5233 405aca 4 API calls 5231->5233 5232->5228 5237 405a78 2 API calls 5232->5237 5238 40483e 5232->5238 5234 4047f3 GetDiskFreeSpaceA 5233->5234 5236 404817 MulDiv 5234->5236 5234->5238 5236->5238 5237->5232 5240 4048af 5238->5240 5256 404a46 5238->5256 5239 4048d2 5267 40417c KiUserCallbackDispatcher 5239->5267 5240->5239 5242 40140b 2 API calls 5240->5242 5242->5239 5244 4048b1 SetDlgItemTextA 5244->5240 5245 4048a1 5259 404981 5245->5259 5248 4048ee 5248->5249 5250 404523 SendMessageA 5248->5250 5249->5202 5250->5249 5251->5197 5252->5221 5253->5206 5254->5223 5255->5231 5257 404981 20 API calls 5256->5257 5258 40489c 5257->5258 5258->5244 5258->5245 5261 404997 5259->5261 5260 4060bb 17 API calls 5262 4049fb 5260->5262 5261->5260 5263 4060bb 17 API calls 5262->5263 5264 404a06 5263->5264 5265 4060bb 17 API calls 5264->5265 5266 404a1c lstrlenA wsprintfA SetDlgItemTextA 5265->5266 5266->5240 5267->5248 4217 4020cb 4218 402ac1 17 API calls 4217->4218 4219 4020d2 4218->4219 4220 402ac1 17 API calls 4219->4220 4221 4020dc 4220->4221 4222 402ac1 17 API calls 4221->4222 4223 4020e6 4222->4223 4224 402ac1 17 API calls 4223->4224 4225 4020f0 4224->4225 4226 402ac1 17 API calls 4225->4226 4227 4020fa 4226->4227 4228 40213c CoCreateInstance 4227->4228 4229 402ac1 17 API calls 4227->4229 4232 40215b 4228->4232 4234 402206 4228->4234 4229->4228 4231 40223c 4233 4021e6 MultiByteToWideChar 4232->4233 4232->4234 4233->4234 4234->4231 4235 401423 4234->4235 4236 4051c0 24 API calls 4235->4236 4237 401431 4236->4237 4237->4231 5268 1000180d 5269 10001830 5268->5269 5270 10001860 GlobalFree 5269->5270 5271 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5269->5271 5270->5271 5272 10001266 2 API calls 5271->5272 5273 100019e3 GlobalFree GlobalFree 5272->5273 5274 4026ce 5275 4026d4 5274->5275 5276 4026d8 FindNextFileA 5275->5276 5279 4026ea 5275->5279 5277 402729 5276->5277 5276->5279 5280 406099 lstrcpynA 5277->5280 5280->5279 4677 4023d0 4678 402ac1 17 API calls 4677->4678 4679 4023e2 4678->4679 4680 402ac1 17 API calls 4679->4680 4681 4023ec 4680->4681 4694 402b51 4681->4694 4684 402421 4685 40242d 4684->4685 4687 402a9f 17 API calls 4684->4687 4688 40244c RegSetValueExA 4685->4688 4690 40303e 44 API calls 4685->4690 4686 402ac1 17 API calls 4689 40241a lstrlenA 4686->4689 4687->4685 4691 402462 RegCloseKey 4688->4691 4689->4684 4690->4688 4693 402716 4691->4693 4695 402b6c 4694->4695 4698 405f4d 4695->4698 4699 405f5c 4698->4699 4700 4023fc 4699->4700 4701 405f67 RegCreateKeyExA 4699->4701 4700->4684 4700->4686 4700->4693 4701->4700 5281 401cd4 5282 402a9f 17 API calls 5281->5282 5283 401cda IsWindow 5282->5283 5284 401a0e 5283->5284 4702 4014d6 4703 402a9f 17 API calls 4702->4703 4704 4014dc Sleep 4703->4704 4706 402951 4704->4706 4707 401759 4708 402ac1 17 API calls 4707->4708 4709 401760 4708->4709 4710 401786 4709->4710 4711 40177e 4709->4711 4748 406099 lstrcpynA 4710->4748 4747 406099 lstrcpynA 4711->4747 4714 401784 4718 406303 5 API calls 4714->4718 4715 401791 4716 405a31 3 API calls 4715->4716 4717 401797 lstrcatA 4716->4717 4717->4714 4731 4017a3 4718->4731 4719 40639c 2 API calls 4719->4731 4720 4017e4 4721 405c0d 2 API calls 4720->4721 4721->4731 4723 4017ba CompareFileTime 4723->4731 4724 40187e 4725 4051c0 24 API calls 4724->4725 4728 401888 4725->4728 4726 4051c0 24 API calls 4735 40186a 4726->4735 4727 406099 lstrcpynA 4727->4731 4729 40303e 44 API calls 4728->4729 4730 40189b 4729->4730 4732 4018af SetFileTime 4730->4732 4734 4018c1 FindCloseChangeNotification 4730->4734 4731->4719 4731->4720 4731->4723 4731->4724 4731->4727 4733 4060bb 17 API calls 4731->4733 4742 4057b5 MessageBoxIndirectA 4731->4742 4745 401855 4731->4745 4746 405c32 GetFileAttributesA CreateFileA 4731->4746 4732->4734 4733->4731 4734->4735 4736 4018d2 4734->4736 4737 4018d7 4736->4737 4738 4018ea 4736->4738 4740 4060bb 17 API calls 4737->4740 4739 4060bb 17 API calls 4738->4739 4741 4018f2 4739->4741 4743 4018df lstrcatA 4740->4743 4744 4057b5 MessageBoxIndirectA 4741->4744 4742->4731 4743->4741 4744->4735 4745->4726 4745->4735 4746->4731 4747->4714 4748->4715 5285 401659 5286 402ac1 17 API calls 5285->5286 5287 40165f 5286->5287 5288 40639c 2 API calls 5287->5288 5289 401665 5288->5289 5290 401959 5291 402a9f 17 API calls 5290->5291 5292 401960 5291->5292 5293 402a9f 17 API calls 5292->5293 5294 40196d 5293->5294 5295 402ac1 17 API calls 5294->5295 5296 401984 lstrlenA 5295->5296 5298 401994 5296->5298 5297 4019d4 5298->5297 5302 406099 lstrcpynA 5298->5302 5300 4019c4 5300->5297 5301 4019c9 lstrlenA 5300->5301 5301->5297 5302->5300 5303 1000161a 5304 10001649 5303->5304 5305 10001a5d 18 API calls 5304->5305 5306 10001650 5305->5306 5307 10001663 5306->5307 5308 10001657 5306->5308 5310 1000168a 5307->5310 5311 1000166d 5307->5311 5309 10001266 2 API calls 5308->5309 5319 10001661 5309->5319 5313 10001690 5310->5313 5314 100016b4 5310->5314 5312 100014e2 3 API calls 5311->5312 5317 10001672 5312->5317 5315 10001559 3 API calls 5313->5315 5316 100014e2 3 API calls 5314->5316 5318 10001695 5315->5318 5316->5319 5320 10001559 3 API calls 5317->5320 5321 10001266 2 API calls 5318->5321 5322 10001678 5320->5322 5323 1000169b GlobalFree 5321->5323 5324 10001266 2 API calls 5322->5324 5323->5319 5325 100016af GlobalFree 5323->5325 5326 1000167e GlobalFree 5324->5326 5325->5319 5326->5319 5334 401f5b 5335 402ac1 17 API calls 5334->5335 5336 401f62 5335->5336 5337 406431 5 API calls 5336->5337 5338 401f71 5337->5338 5339 401f89 GlobalAlloc 5338->5339 5348 401ff1 5338->5348 5340 401f9d 5339->5340 5339->5348 5341 406431 5 API calls 5340->5341 5342 401fa4 5341->5342 5343 406431 5 API calls 5342->5343 5344 401fae 5343->5344 5344->5348 5349 405ff7 wsprintfA 5344->5349 5346 401fe5 5350 405ff7 wsprintfA 5346->5350 5349->5346 5350->5348 5351 40255b 5352 402ac1 17 API calls 5351->5352 5353 402562 5352->5353 5356 405c32 GetFileAttributesA CreateFileA 5353->5356 5355 40256e 5356->5355 5364 401b5d 5365 401bae 5364->5365 5370 401b6a 5364->5370 5366 401bb2 5365->5366 5367 401bd7 GlobalAlloc 5365->5367 5380 4022e1 5366->5380 5385 406099 lstrcpynA 5366->5385 5369 4060bb 17 API calls 5367->5369 5368 4060bb 17 API calls 5373 4022db 5368->5373 5374 401bf2 5369->5374 5371 401b81 5370->5371 5370->5374 5383 406099 lstrcpynA 5371->5383 5378 4057b5 MessageBoxIndirectA 5373->5378 5374->5368 5374->5380 5376 401bc4 GlobalFree 5376->5380 5377 401b90 5384 406099 lstrcpynA 5377->5384 5378->5380 5381 401b9f 5386 406099 lstrcpynA 5381->5386 5383->5377 5384->5381 5385->5376 5386->5380 5387 401a5e 5388 402a9f 17 API calls 5387->5388 5389 401a64 5388->5389 5390 402a9f 17 API calls 5389->5390 5391 401a0e 5390->5391 4753 4024df 4765 402b01 4753->4765 4756 402a9f 17 API calls 4757 4024f2 4756->4757 4758 402500 4757->4758 4759 402716 4757->4759 4760 402519 RegEnumValueA 4758->4760 4761 40250d RegEnumKeyA 4758->4761 4762 402535 RegCloseKey 4760->4762 4763 40252e 4760->4763 4761->4762 4762->4759 4763->4762 4766 402ac1 17 API calls 4765->4766 4767 402b18 4766->4767 4768 405f1f RegOpenKeyExA 4767->4768 4769 4024e9 4768->4769 4769->4756 5392 402c61 5393 402c70 SetTimer 5392->5393 5394 402c89 5392->5394 5393->5394 5395 402cd7 5394->5395 5396 402cdd MulDiv 5394->5396 5397 402c97 wsprintfA SetWindowTextA SetDlgItemTextA 5396->5397 5397->5395 5406 401563 5407 4028f9 5406->5407 5410 405ff7 wsprintfA 5407->5410 5409 4028fe 5410->5409 5411 40166a 5412 402ac1 17 API calls 5411->5412 5413 401671 5412->5413 5414 402ac1 17 API calls 5413->5414 5415 40167a 5414->5415 5416 402ac1 17 API calls 5415->5416 5417 401683 MoveFileA 5416->5417 5418 401696 5417->5418 5419 40168f 5417->5419 5420 40639c 2 API calls 5418->5420 5423 40223c 5418->5423 5421 401423 24 API calls 5419->5421 5422 4016a5 5420->5422 5421->5423 5422->5423 5424 405e78 36 API calls 5422->5424 5424->5419 4820 40246d 4821 402b01 17 API calls 4820->4821 4822 402477 4821->4822 4823 402ac1 17 API calls 4822->4823 4824 402480 4823->4824 4825 40248a RegQueryValueExA 4824->4825 4827 402716 4824->4827 4826 4024aa 4825->4826 4830 4024b0 RegCloseKey 4825->4830 4826->4830 4831 405ff7 wsprintfA 4826->4831 4830->4827 4831->4830 5425 4019ed 5426 402ac1 17 API calls 5425->5426 5427 4019f4 5426->5427 5428 402ac1 17 API calls 5427->5428 5429 4019fd 5428->5429 5430 401a04 lstrcmpiA 5429->5430 5431 401a16 lstrcmpA 5429->5431 5432 401a0a 5430->5432 5431->5432 5433 40426e lstrcpynA lstrlenA 4832 40156f 4833 401586 4832->4833 4834 40157f ShowWindow 4832->4834 4835 402951 4833->4835 4836 401594 ShowWindow 4833->4836 4834->4833 4836->4835 5441 100015b3 5442 100014bb GlobalFree 5441->5442 5445 100015cb 5442->5445 5443 10001611 GlobalFree 5444 100015e6 5444->5443 5445->5443 5445->5444 5446 100015fd VirtualFree 5445->5446 5446->5443 5447 4014f4 SetForegroundWindow 5448 402951 5447->5448 5449 401cf5 5450 402a9f 17 API calls 5449->5450 5451 401cfc 5450->5451 5452 402a9f 17 API calls 5451->5452 5453 401d08 GetDlgItem 5452->5453 5454 402577 5453->5454 4843 4022f6 4844 402304 4843->4844 4845 4022fe 4843->4845 4847 402314 4844->4847 4848 402ac1 17 API calls 4844->4848 4846 402ac1 17 API calls 4845->4846 4846->4844 4849 402322 4847->4849 4851 402ac1 17 API calls 4847->4851 4848->4847 4850 402ac1 17 API calls 4849->4850 4852 40232b WritePrivateProfileStringA 4850->4852 4851->4849 5455 4026f8 5456 402ac1 17 API calls 5455->5456 5457 4026ff FindFirstFileA 5456->5457 5458 402722 5457->5458 5461 402712 5457->5461 5459 402729 5458->5459 5463 405ff7 wsprintfA 5458->5463 5464 406099 lstrcpynA 5459->5464 5463->5459 5464->5461 4860 40237b 4861 402382 4860->4861 4862 4023ad 4860->4862 4864 402b01 17 API calls 4861->4864 4863 402ac1 17 API calls 4862->4863 4865 4023b4 4863->4865 4866 402389 4864->4866 4872 402b7f 4865->4872 4868 402393 4866->4868 4869 4023c1 4866->4869 4870 402ac1 17 API calls 4868->4870 4871 40239a RegDeleteValueA RegCloseKey 4870->4871 4871->4869 4873 402b95 4872->4873 4875 402bab 4873->4875 4876 402bb4 4873->4876 4875->4869 4877 405f1f RegOpenKeyExA 4876->4877 4878 402be2 4877->4878 4879 402c5a 4878->4879 4881 402be6 4878->4881 4879->4875 4880 402c08 RegEnumKeyA 4880->4881 4882 402c1f RegCloseKey 4880->4882 4881->4880 4881->4882 4883 402c40 RegCloseKey 4881->4883 4885 402bb4 6 API calls 4881->4885 4884 406431 5 API calls 4882->4884 4883->4879 4886 402c2f 4884->4886 4885->4881 4887 402c33 4886->4887 4888 402c4e RegDeleteKeyA 4886->4888 4887->4879 4888->4879 4920 401ffd 4921 4020bd 4920->4921 4922 40200f 4920->4922 4924 401423 24 API calls 4921->4924 4923 402ac1 17 API calls 4922->4923 4925 402016 4923->4925 4931 40223c 4924->4931 4926 402ac1 17 API calls 4925->4926 4927 40201f 4926->4927 4928 402034 LoadLibraryExA 4927->4928 4929 402027 GetModuleHandleA 4927->4929 4928->4921 4930 402044 GetProcAddress 4928->4930 4929->4928 4929->4930 4932 402090 4930->4932 4933 402053 4930->4933 4936 4051c0 24 API calls 4932->4936 4934 402072 4933->4934 4935 40205b 4933->4935 4941 100016bd 4934->4941 4937 401423 24 API calls 4935->4937 4938 402063 4936->4938 4937->4938 4938->4931 4939 4020b1 FreeLibrary 4938->4939 4939->4931 4942 100016ed 4941->4942 4983 10001a5d 4942->4983 4944 100016f4 4945 1000180a 4944->4945 4946 10001705 4944->4946 4947 1000170c 4944->4947 4945->4938 5031 100021b0 4946->5031 5015 100021fa 4947->5015 4952 10001770 4956 100017b2 4952->4956 4957 10001776 4952->4957 4953 10001752 5044 100023d8 4953->5044 4954 10001722 4959 10001728 4954->4959 4964 10001733 4954->4964 4955 1000173b 4968 10001731 4955->4968 5041 10002a9f 4955->5041 4962 100023d8 11 API calls 4956->4962 4960 10001559 3 API calls 4957->4960 4959->4968 5025 100027e4 4959->5025 4967 1000178c 4960->4967 4969 100017a4 4962->4969 4963 10001758 5055 10001559 4963->5055 5035 10002587 4964->5035 4972 100023d8 11 API calls 4967->4972 4968->4952 4968->4953 4974 100017f9 4969->4974 5066 1000239e 4969->5066 4971 10001739 4971->4968 4972->4969 4974->4945 4976 10001803 GlobalFree 4974->4976 4976->4945 4980 100017e5 4980->4974 5070 100014e2 wsprintfA 4980->5070 4982 100017de FreeLibrary 4982->4980 5073 10001215 GlobalAlloc 4983->5073 4985 10001a81 5074 10001215 GlobalAlloc 4985->5074 4987 10001cbb GlobalFree GlobalFree GlobalFree 4988 10001cd8 4987->4988 5004 10001d22 4987->5004 4989 1000201a 4988->4989 4996 10001ced 4988->4996 4988->5004 4991 1000203c GetModuleHandleA 4989->4991 4989->5004 4990 10001b60 GlobalAlloc 5003 10001a8c 4990->5003 4994 10002062 4991->4994 4995 1000204d LoadLibraryA 4991->4995 4992 10001bab lstrcpyA 4997 10001bb5 lstrcpyA 4992->4997 4993 10001bc9 GlobalFree 4993->5003 5081 100015a4 GetProcAddress 4994->5081 4995->4994 4995->5004 4996->5004 5077 10001224 4996->5077 4997->5003 4999 100020b3 5000 100020c0 lstrlenA 4999->5000 4999->5004 5082 100015a4 GetProcAddress 5000->5082 5002 10001f7a 5002->5004 5008 10001fbe lstrcpyA 5002->5008 5003->4987 5003->4990 5003->4992 5003->4993 5003->4997 5003->5002 5003->5004 5009 10001e75 GlobalFree 5003->5009 5011 10001224 2 API calls 5003->5011 5013 10001c07 5003->5013 5080 10001215 GlobalAlloc 5003->5080 5004->4944 5005 10002074 5005->4999 5014 1000209d GetProcAddress 5005->5014 5008->5004 5009->5003 5011->5003 5012 100020d9 5012->5004 5013->5003 5075 10001534 GlobalSize GlobalAlloc 5013->5075 5014->4999 5016 10002212 5015->5016 5018 10002347 GlobalFree 5016->5018 5020 100022bb GlobalAlloc MultiByteToWideChar 5016->5020 5021 10001224 GlobalAlloc lstrcpynA 5016->5021 5023 10002306 5016->5023 5084 100012ad 5016->5084 5018->5016 5019 10001712 5018->5019 5019->4954 5019->4955 5019->4968 5022 100022e5 GlobalAlloc CLSIDFromString GlobalFree 5020->5022 5020->5023 5021->5016 5022->5018 5023->5018 5088 1000251b 5023->5088 5027 100027f6 5025->5027 5026 1000289b ReadFile 5028 100028b9 5026->5028 5027->5026 5029 100029b5 5028->5029 5030 100029aa GetLastError 5028->5030 5029->4968 5030->5029 5032 100021c0 5031->5032 5033 1000170b 5031->5033 5032->5033 5034 100021d2 GlobalAlloc 5032->5034 5033->4947 5034->5032 5039 100025a3 5035->5039 5036 100025f4 GlobalAlloc 5040 10002616 5036->5040 5037 10002607 5038 1000260c GlobalSize 5037->5038 5037->5040 5038->5040 5039->5036 5039->5037 5040->4971 5042 10002aaa 5041->5042 5043 10002aea GlobalFree 5042->5043 5091 10001215 GlobalAlloc 5044->5091 5046 10002438 lstrcpynA 5051 100023e4 5046->5051 5047 10002449 StringFromGUID2 WideCharToMultiByte 5047->5051 5048 1000246d WideCharToMultiByte 5048->5051 5049 100024b2 GlobalFree 5049->5051 5050 1000248e wsprintfA 5050->5051 5051->5046 5051->5047 5051->5048 5051->5049 5051->5050 5052 100024ec GlobalFree 5051->5052 5053 10001266 2 API calls 5051->5053 5092 100012d1 5051->5092 5052->4963 5053->5051 5096 10001215 GlobalAlloc 5055->5096 5057 1000155f 5058 1000156c lstrcpyA 5057->5058 5060 10001586 5057->5060 5061 100015a0 5058->5061 5060->5061 5062 1000158b wsprintfA 5060->5062 5063 10001266 5061->5063 5062->5061 5064 100012a8 GlobalFree 5063->5064 5065 1000126f GlobalAlloc lstrcpynA 5063->5065 5064->4969 5065->5064 5067 100017c5 5066->5067 5068 100023ac 5066->5068 5067->4980 5067->4982 5068->5067 5069 100023c5 GlobalFree 5068->5069 5069->5068 5071 10001266 2 API calls 5070->5071 5072 10001503 5071->5072 5072->4974 5073->4985 5074->5003 5076 10001552 5075->5076 5076->5013 5083 10001215 GlobalAlloc 5077->5083 5079 10001233 lstrcpynA 5079->5004 5080->5003 5081->5005 5082->5012 5083->5079 5085 100012b4 5084->5085 5086 10001224 2 API calls 5085->5086 5087 100012cf 5086->5087 5087->5016 5089 10002529 VirtualAlloc 5088->5089 5090 1000257f 5088->5090 5089->5090 5090->5023 5091->5051 5093 100012f9 5092->5093 5094 100012da 5092->5094 5093->5051 5094->5093 5095 100012e0 lstrcpyA 5094->5095 5095->5093 5096->5057 5465 1000103d 5466 1000101b 5 API calls 5465->5466 5467 10001056 5466->5467 5468 4018fd 5469 401934 5468->5469 5470 402ac1 17 API calls 5469->5470 5471 401939 5470->5471 5472 405861 67 API calls 5471->5472 5473 401942 5472->5473 5474 40257d 5475 402582 5474->5475 5476 402596 5474->5476 5477 402a9f 17 API calls 5475->5477 5478 402ac1 17 API calls 5476->5478 5480 40258b 5477->5480 5479 40259d lstrlenA 5478->5479 5479->5480 5481 4025bf 5480->5481 5482 405cd9 WriteFile 5480->5482 5482->5481 5097 4052fe 5098 405320 GetDlgItem GetDlgItem GetDlgItem 5097->5098 5099 4054a9 5097->5099 5143 40418f SendMessageA 5098->5143 5101 4054b1 GetDlgItem CreateThread FindCloseChangeNotification 5099->5101 5103 4054d9 5099->5103 5101->5103 5146 405292 5 API calls 5101->5146 5102 405507 5104 405562 5102->5104 5105 40550f 5102->5105 5103->5102 5107 405528 5103->5107 5108 4054ef ShowWindow ShowWindow 5103->5108 5104->5107 5120 40556f SendMessageA 5104->5120 5109 405517 5105->5109 5110 40553b ShowWindow 5105->5110 5106 405390 5112 405397 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5106->5112 5111 4041c1 8 API calls 5107->5111 5145 40418f SendMessageA 5108->5145 5114 404133 SendMessageA 5109->5114 5116 40555b 5110->5116 5117 40554d 5110->5117 5115 405534 5111->5115 5118 405405 5112->5118 5119 4053e9 SendMessageA SendMessageA 5112->5119 5114->5107 5122 404133 SendMessageA 5116->5122 5121 4051c0 24 API calls 5117->5121 5123 405418 5118->5123 5124 40540a SendMessageA 5118->5124 5119->5118 5120->5115 5125 405588 CreatePopupMenu 5120->5125 5121->5116 5122->5104 5126 40415a 18 API calls 5123->5126 5124->5123 5127 4060bb 17 API calls 5125->5127 5129 405428 5126->5129 5128 405598 AppendMenuA 5127->5128 5130 4055b6 GetWindowRect 5128->5130 5131 4055c9 TrackPopupMenu 5128->5131 5132 405431 ShowWindow 5129->5132 5133 405465 GetDlgItem SendMessageA 5129->5133 5130->5131 5131->5115 5134 4055e5 5131->5134 5135 405454 5132->5135 5136 405447 ShowWindow 5132->5136 5133->5115 5137 40548c SendMessageA SendMessageA 5133->5137 5138 405604 SendMessageA 5134->5138 5144 40418f SendMessageA 5135->5144 5136->5135 5137->5115 5138->5138 5139 405621 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5138->5139 5141 405643 SendMessageA 5139->5141 5141->5141 5142 405665 GlobalUnlock SetClipboardData CloseClipboard 5141->5142 5142->5115 5143->5106 5144->5133 5145->5102 5483 100029bf 5484 100029d7 5483->5484 5485 10001534 2 API calls 5484->5485 5486 100029f2 5485->5486 5487 401000 5488 401037 BeginPaint GetClientRect 5487->5488 5489 40100c DefWindowProcA 5487->5489 5491 4010f3 5488->5491 5492 401179 5489->5492 5493 401073 CreateBrushIndirect FillRect DeleteObject 5491->5493 5494 4010fc 5491->5494 5493->5491 5495 401102 CreateFontIndirectA 5494->5495 5496 401167 EndPaint 5494->5496 5495->5496 5497 401112 6 API calls 5495->5497 5496->5492 5497->5496 5498 401900 5499 402ac1 17 API calls 5498->5499 5500 401907 5499->5500 5501 4057b5 MessageBoxIndirectA 5500->5501 5502 401910 5501->5502 3974 402682 3975 402689 3974->3975 3981 4028fe 3974->3981 3982 402a9f 3975->3982 3977 402690 3978 40269f SetFilePointer 3977->3978 3979 4026af 3978->3979 3978->3981 3985 405ff7 wsprintfA 3979->3985 3986 4060bb 3982->3986 3984 402ab4 3984->3977 3985->3981 4002 4060c8 3986->4002 3987 4062ea 3988 4062ff 3987->3988 4019 406099 lstrcpynA 3987->4019 3988->3984 3990 4062c4 lstrlenA 3990->4002 3991 4060bb 10 API calls 3991->3990 3995 4061e0 GetSystemDirectoryA 3995->4002 3996 4061f3 GetWindowsDirectoryA 3996->4002 3998 4060bb 10 API calls 3998->4002 3999 40626d lstrcatA 3999->4002 4000 406227 SHGetSpecialFolderLocation 4001 40623f SHGetPathFromIDListA CoTaskMemFree 4000->4001 4000->4002 4001->4002 4002->3987 4002->3990 4002->3991 4002->3995 4002->3996 4002->3998 4002->3999 4002->4000 4003 405f80 4002->4003 4008 406303 4002->4008 4017 405ff7 wsprintfA 4002->4017 4018 406099 lstrcpynA 4002->4018 4020 405f1f 4003->4020 4006 405fb4 RegQueryValueExA RegCloseKey 4007 405fe3 4006->4007 4007->4002 4009 40630f 4008->4009 4011 40636c CharNextA 4009->4011 4013 406377 4009->4013 4015 40635a CharNextA 4009->4015 4016 406367 CharNextA 4009->4016 4024 405a5c 4009->4024 4010 40637b CharPrevA 4010->4013 4011->4009 4011->4013 4013->4010 4014 406396 4013->4014 4014->4002 4015->4009 4016->4011 4017->4002 4018->4002 4019->3988 4021 405f2e 4020->4021 4022 405f32 4021->4022 4023 405f37 RegOpenKeyExA 4021->4023 4022->4006 4022->4007 4023->4022 4025 405a62 4024->4025 4026 405a75 4025->4026 4027 405a68 CharNextA 4025->4027 4026->4009 4027->4025 5503 401502 5504 40150a 5503->5504 5506 40151d 5503->5506 5505 402a9f 17 API calls 5504->5505 5505->5506 5507 404583 5508 404593 5507->5508 5509 4045b9 5507->5509 5511 40415a 18 API calls 5508->5511 5510 4041c1 8 API calls 5509->5510 5513 4045c5 5510->5513 5512 4045a0 SetDlgItemTextA 5511->5512 5512->5509 4040 401c04 4041 402a9f 17 API calls 4040->4041 4042 401c0b 4041->4042 4043 402a9f 17 API calls 4042->4043 4044 401c18 4043->4044 4045 402ac1 17 API calls 4044->4045 4046 401c2d 4044->4046 4045->4046 4047 402ac1 17 API calls 4046->4047 4051 401c3d 4046->4051 4047->4051 4048 401c94 4062 402ac1 4048->4062 4049 401c48 4052 402a9f 17 API calls 4049->4052 4051->4048 4051->4049 4054 401c4d 4052->4054 4056 402a9f 17 API calls 4054->4056 4055 402ac1 17 API calls 4057 401ca2 FindWindowExA 4055->4057 4058 401c59 4056->4058 4061 401cc0 4057->4061 4059 401c84 SendMessageA 4058->4059 4060 401c66 SendMessageTimeoutA 4058->4060 4059->4061 4060->4061 4063 402acd 4062->4063 4064 4060bb 17 API calls 4063->4064 4065 402aee 4064->4065 4066 401c99 4065->4066 4067 406303 5 API calls 4065->4067 4066->4055 4067->4066 4107 403c86 4108 403dd9 4107->4108 4109 403c9e 4107->4109 4111 403e2a 4108->4111 4112 403dea GetDlgItem GetDlgItem 4108->4112 4109->4108 4110 403caa 4109->4110 4114 403cb5 SetWindowPos 4110->4114 4115 403cc8 4110->4115 4113 403e84 4111->4113 4121 401389 2 API calls 4111->4121 4116 40415a 18 API calls 4112->4116 4137 403dd4 4113->4137 4178 4041a6 4113->4178 4114->4115 4118 403ce5 4115->4118 4119 403ccd ShowWindow 4115->4119 4120 403e14 SetClassLongA 4116->4120 4122 403d07 4118->4122 4123 403ced DestroyWindow 4118->4123 4119->4118 4124 40140b 2 API calls 4120->4124 4127 403e5c 4121->4127 4125 403d0c SetWindowLongA 4122->4125 4126 403d1d 4122->4126 4177 4040e3 4123->4177 4124->4111 4125->4137 4128 403dc6 4126->4128 4129 403d29 GetDlgItem 4126->4129 4127->4113 4130 403e60 SendMessageA 4127->4130 4200 4041c1 4128->4200 4133 403d59 4129->4133 4134 403d3c SendMessageA IsWindowEnabled 4129->4134 4130->4137 4131 40140b 2 API calls 4145 403e96 4131->4145 4132 4040e5 DestroyWindow EndDialog 4132->4177 4139 403d66 4133->4139 4142 403dad SendMessageA 4133->4142 4143 403d79 4133->4143 4151 403d5e 4133->4151 4134->4133 4134->4137 4136 404114 ShowWindow 4136->4137 4138 4060bb 17 API calls 4138->4145 4139->4142 4139->4151 4141 40415a 18 API calls 4141->4145 4142->4128 4146 403d81 4143->4146 4147 403d96 4143->4147 4144 403d94 4144->4128 4145->4131 4145->4132 4145->4137 4145->4138 4145->4141 4168 404025 DestroyWindow 4145->4168 4181 40415a 4145->4181 4194 40140b 4146->4194 4148 40140b 2 API calls 4147->4148 4150 403d9d 4148->4150 4150->4128 4150->4151 4197 404133 4151->4197 4153 403f11 GetDlgItem 4154 403f26 4153->4154 4155 403f2e ShowWindow KiUserCallbackDispatcher 4153->4155 4154->4155 4184 40417c KiUserCallbackDispatcher 4155->4184 4157 403f58 EnableWindow 4162 403f6c 4157->4162 4158 403f71 GetSystemMenu EnableMenuItem SendMessageA 4159 403fa1 SendMessageA 4158->4159 4158->4162 4159->4162 4162->4158 4185 40418f SendMessageA 4162->4185 4186 403c67 4162->4186 4189 406099 lstrcpynA 4162->4189 4164 403fd0 lstrlenA 4165 4060bb 17 API calls 4164->4165 4166 403fe1 SetWindowTextA 4165->4166 4190 401389 4166->4190 4169 40403f CreateDialogParamA 4168->4169 4168->4177 4170 404072 4169->4170 4169->4177 4171 40415a 18 API calls 4170->4171 4172 40407d GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4171->4172 4173 401389 2 API calls 4172->4173 4174 4040c3 4173->4174 4174->4137 4175 4040cb ShowWindow 4174->4175 4176 4041a6 SendMessageA 4175->4176 4176->4177 4177->4136 4177->4137 4179 4041be 4178->4179 4180 4041af SendMessageA 4178->4180 4179->4145 4180->4179 4182 4060bb 17 API calls 4181->4182 4183 404165 SetDlgItemTextA 4182->4183 4183->4153 4184->4157 4185->4162 4187 4060bb 17 API calls 4186->4187 4188 403c75 SetWindowTextA 4187->4188 4188->4162 4189->4164 4192 401390 4190->4192 4191 4013fe 4191->4145 4192->4191 4193 4013cb MulDiv SendMessageA 4192->4193 4193->4192 4195 401389 2 API calls 4194->4195 4196 401420 4195->4196 4196->4151 4198 404140 SendMessageA 4197->4198 4199 40413a 4197->4199 4198->4144 4199->4198 4201 404262 4200->4201 4202 4041d9 GetWindowLongA 4200->4202 4201->4137 4202->4201 4203 4041ea 4202->4203 4204 4041f9 GetSysColor 4203->4204 4205 4041fc 4203->4205 4204->4205 4206 404202 SetTextColor 4205->4206 4207 40420c SetBkMode 4205->4207 4206->4207 4208 404224 GetSysColor 4207->4208 4209 40422a 4207->4209 4208->4209 4210 404231 SetBkColor 4209->4210 4211 40423b 4209->4211 4210->4211 4211->4201 4212 404255 CreateBrushIndirect 4211->4212 4213 40424e DeleteObject 4211->4213 4212->4201 4213->4212 4238 40330d SetErrorMode GetVersion 4239 40334e 4238->4239 4240 403354 4238->4240 4241 406431 5 API calls 4239->4241 4329 4063c3 GetSystemDirectoryA 4240->4329 4241->4240 4243 40336a lstrlenA 4243->4240 4244 403379 4243->4244 4332 406431 GetModuleHandleA 4244->4332 4247 406431 5 API calls 4248 403387 4247->4248 4249 406431 5 API calls 4248->4249 4250 403393 #17 OleInitialize SHGetFileInfoA 4249->4250 4338 406099 lstrcpynA 4250->4338 4253 4033df GetCommandLineA 4339 406099 lstrcpynA 4253->4339 4255 4033f1 GetModuleHandleA 4256 403408 4255->4256 4257 405a5c CharNextA 4256->4257 4258 40341c CharNextA 4257->4258 4267 40342c 4258->4267 4259 4034f6 4260 403509 GetTempPathA 4259->4260 4340 4032dc 4260->4340 4262 403521 4264 403525 GetWindowsDirectoryA lstrcatA 4262->4264 4265 40357b DeleteFileA 4262->4265 4263 405a5c CharNextA 4263->4267 4268 4032dc 12 API calls 4264->4268 4350 402d98 GetTickCount GetModuleFileNameA 4265->4350 4267->4259 4267->4263 4269 4034f8 4267->4269 4271 403541 4268->4271 4447 406099 lstrcpynA 4269->4447 4270 40358f 4272 403625 4270->4272 4276 403615 4270->4276 4280 405a5c CharNextA 4270->4280 4271->4265 4274 403545 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4271->4274 4464 4037f7 4272->4464 4275 4032dc 12 API calls 4274->4275 4278 403573 4275->4278 4380 4038e9 4276->4380 4278->4265 4278->4272 4282 4035aa 4280->4282 4291 4035f0 4282->4291 4292 403655 4282->4292 4283 40375d 4285 403765 GetCurrentProcess OpenProcessToken 4283->4285 4286 4037df ExitProcess 4283->4286 4284 40363f 4473 4057b5 4284->4473 4288 4037b0 4285->4288 4289 403780 LookupPrivilegeValueA AdjustTokenPrivileges 4285->4289 4294 406431 5 API calls 4288->4294 4289->4288 4448 405b1f 4291->4448 4436 405720 4292->4436 4298 4037b7 4294->4298 4302 4037cc ExitWindowsEx 4298->4302 4305 4037d8 4298->4305 4300 403676 lstrcatA lstrcmpiA 4300->4272 4304 403692 4300->4304 4301 40366b lstrcatA 4301->4300 4302->4286 4302->4305 4307 403697 4304->4307 4308 40369e 4304->4308 4309 40140b 2 API calls 4305->4309 4306 40360a 4463 406099 lstrcpynA 4306->4463 4477 405686 CreateDirectoryA 4307->4477 4482 405703 CreateDirectoryA 4308->4482 4309->4286 4314 4036a3 SetCurrentDirectoryA 4315 4036b2 4314->4315 4316 4036bd 4314->4316 4485 406099 lstrcpynA 4315->4485 4439 406099 lstrcpynA 4316->4439 4319 4060bb 17 API calls 4320 4036fc DeleteFileA 4319->4320 4321 403709 CopyFileA 4320->4321 4326 4036cb 4320->4326 4321->4326 4322 403751 4324 405e78 36 API calls 4322->4324 4324->4272 4325 4060bb 17 API calls 4325->4326 4326->4319 4326->4322 4326->4325 4328 40373d CloseHandle 4326->4328 4440 405e78 MoveFileExA 4326->4440 4444 405738 CreateProcessA 4326->4444 4328->4326 4330 4063e5 wsprintfA LoadLibraryExA 4329->4330 4330->4243 4333 406457 GetProcAddress 4332->4333 4334 40644d 4332->4334 4336 403380 4333->4336 4335 4063c3 3 API calls 4334->4335 4337 406453 4335->4337 4336->4247 4337->4333 4337->4336 4338->4253 4339->4255 4341 406303 5 API calls 4340->4341 4343 4032e8 4341->4343 4342 4032f2 4342->4262 4343->4342 4486 405a31 lstrlenA CharPrevA 4343->4486 4346 405703 2 API calls 4347 403300 4346->4347 4348 405c61 2 API calls 4347->4348 4349 40330b 4348->4349 4349->4262 4489 405c32 GetFileAttributesA CreateFileA 4350->4489 4352 402ddb 4379 402de8 4352->4379 4490 406099 lstrcpynA 4352->4490 4354 402dfe 4491 405a78 lstrlenA 4354->4491 4358 402e0f GetFileSize 4359 402f10 4358->4359 4378 402e26 4358->4378 4496 402cf9 4359->4496 4363 402f53 GlobalAlloc 4366 402f6a 4363->4366 4364 402fab 4367 402cf9 32 API calls 4364->4367 4371 405c61 2 API calls 4366->4371 4367->4379 4368 402f34 4369 4032af ReadFile 4368->4369 4372 402f3f 4369->4372 4370 402cf9 32 API calls 4370->4378 4373 402f7b CreateFileA 4371->4373 4372->4363 4372->4379 4374 402fb5 4373->4374 4373->4379 4511 4032c5 SetFilePointer 4374->4511 4376 402fc3 4512 40303e 4376->4512 4378->4359 4378->4364 4378->4370 4378->4379 4527 4032af 4378->4527 4379->4270 4381 406431 5 API calls 4380->4381 4382 4038fd 4381->4382 4383 403903 4382->4383 4384 403915 4382->4384 4576 405ff7 wsprintfA 4383->4576 4385 405f80 3 API calls 4384->4385 4386 403940 4385->4386 4388 40395e lstrcatA 4386->4388 4390 405f80 3 API calls 4386->4390 4389 403913 4388->4389 4561 403bae 4389->4561 4390->4388 4393 405b1f 18 API calls 4394 403990 4393->4394 4395 403a19 4394->4395 4397 405f80 3 API calls 4394->4397 4396 405b1f 18 API calls 4395->4396 4398 403a1f 4396->4398 4399 4039bc 4397->4399 4400 403a2f LoadImageA 4398->4400 4401 4060bb 17 API calls 4398->4401 4399->4395 4404 4039d8 lstrlenA 4399->4404 4408 405a5c CharNextA 4399->4408 4402 403ad5 4400->4402 4403 403a56 RegisterClassA 4400->4403 4401->4400 4407 40140b 2 API calls 4402->4407 4405 403adf 4403->4405 4406 403a8c SystemParametersInfoA CreateWindowExA 4403->4406 4409 4039e6 lstrcmpiA 4404->4409 4410 403a0c 4404->4410 4405->4272 4406->4402 4411 403adb 4407->4411 4412 4039d6 4408->4412 4409->4410 4413 4039f6 GetFileAttributesA 4409->4413 4414 405a31 3 API calls 4410->4414 4411->4405 4416 403bae 18 API calls 4411->4416 4412->4404 4415 403a02 4413->4415 4417 403a12 4414->4417 4415->4410 4419 405a78 2 API calls 4415->4419 4420 403aec 4416->4420 4577 406099 lstrcpynA 4417->4577 4419->4410 4421 403af8 ShowWindow 4420->4421 4422 403b7b 4420->4422 4423 4063c3 3 API calls 4421->4423 4569 405292 OleInitialize 4422->4569 4426 403b10 4423->4426 4425 403b81 4428 403b85 4425->4428 4429 403b9d 4425->4429 4427 403b1e GetClassInfoA 4426->4427 4430 4063c3 3 API calls 4426->4430 4432 403b32 GetClassInfoA RegisterClassA 4427->4432 4433 403b48 DialogBoxParamA 4427->4433 4428->4405 4434 40140b 2 API calls 4428->4434 4431 40140b 2 API calls 4429->4431 4430->4427 4431->4405 4432->4433 4435 40140b 2 API calls 4433->4435 4434->4405 4435->4405 4437 406431 5 API calls 4436->4437 4438 40365a lstrcatA 4437->4438 4438->4300 4438->4301 4439->4326 4441 405e8c 4440->4441 4443 405e99 4440->4443 4579 405d08 4441->4579 4443->4326 4445 405777 4444->4445 4446 40576b CloseHandle 4444->4446 4445->4326 4446->4445 4447->4260 4613 406099 lstrcpynA 4448->4613 4450 405b30 4614 405aca CharNextA CharNextA 4450->4614 4453 4035fb 4453->4272 4462 406099 lstrcpynA 4453->4462 4454 406303 5 API calls 4457 405b46 4454->4457 4455 405b71 lstrlenA 4456 405b7c 4455->4456 4455->4457 4459 405a31 3 API calls 4456->4459 4457->4453 4457->4455 4458 40639c 2 API calls 4457->4458 4461 405a78 2 API calls 4457->4461 4458->4457 4460 405b81 GetFileAttributesA 4459->4460 4460->4453 4461->4455 4462->4306 4463->4276 4465 403812 4464->4465 4466 403808 CloseHandle 4464->4466 4467 403826 4465->4467 4468 40381c CloseHandle 4465->4468 4466->4465 4620 403854 4467->4620 4468->4467 4474 4057ca 4473->4474 4475 40364d ExitProcess 4474->4475 4476 4057de MessageBoxIndirectA 4474->4476 4476->4475 4478 40369c 4477->4478 4479 4056d7 GetLastError 4477->4479 4478->4314 4479->4478 4480 4056e6 SetFileSecurityA 4479->4480 4480->4478 4481 4056fc GetLastError 4480->4481 4481->4478 4483 405713 4482->4483 4484 405717 GetLastError 4482->4484 4483->4314 4484->4483 4485->4316 4487 4032fa 4486->4487 4488 405a4b lstrcatA 4486->4488 4487->4346 4488->4487 4489->4352 4490->4354 4492 405a85 4491->4492 4493 402e04 4492->4493 4494 405a8a CharPrevA 4492->4494 4495 406099 lstrcpynA 4493->4495 4494->4492 4494->4493 4495->4358 4497 402d07 4496->4497 4498 402d1f 4496->4498 4501 402d10 DestroyWindow 4497->4501 4502 402d17 4497->4502 4499 402d27 4498->4499 4500 402d2f GetTickCount 4498->4500 4531 40646d 4499->4531 4500->4502 4504 402d3d 4500->4504 4501->4502 4502->4363 4502->4379 4530 4032c5 SetFilePointer 4502->4530 4505 402d72 CreateDialogParamA ShowWindow 4504->4505 4506 402d45 4504->4506 4505->4502 4506->4502 4535 402cdd 4506->4535 4508 402d53 wsprintfA 4509 4051c0 24 API calls 4508->4509 4510 402d70 4509->4510 4510->4502 4511->4376 4513 403069 4512->4513 4514 40304d SetFilePointer 4512->4514 4538 403146 GetTickCount 4513->4538 4514->4513 4517 405caa ReadFile 4518 403089 4517->4518 4519 403146 42 API calls 4518->4519 4521 403106 4518->4521 4520 4030a0 4519->4520 4520->4521 4522 40310c ReadFile 4520->4522 4524 4030af 4520->4524 4521->4379 4522->4521 4524->4521 4525 405caa ReadFile 4524->4525 4551 405cd9 WriteFile 4524->4551 4525->4524 4528 405caa ReadFile 4527->4528 4529 4032c2 4528->4529 4529->4378 4530->4368 4532 40648a PeekMessageA 4531->4532 4533 406480 DispatchMessageA 4532->4533 4534 40649a 4532->4534 4533->4532 4534->4502 4536 402cec 4535->4536 4537 402cee MulDiv 4535->4537 4536->4537 4537->4508 4539 403174 4538->4539 4540 40329e 4538->4540 4553 4032c5 SetFilePointer 4539->4553 4541 402cf9 32 API calls 4540->4541 4548 403070 4541->4548 4543 40317f SetFilePointer 4547 4031a4 4543->4547 4544 4032af ReadFile 4544->4547 4546 402cf9 32 API calls 4546->4547 4547->4544 4547->4546 4547->4548 4549 405cd9 WriteFile 4547->4549 4550 40327f SetFilePointer 4547->4550 4554 406576 4547->4554 4548->4517 4548->4521 4549->4547 4550->4540 4552 405cf7 4551->4552 4552->4524 4553->4543 4555 4065a3 4554->4555 4556 40659b 4554->4556 4555->4556 4557 406633 GlobalAlloc 4555->4557 4558 40662a GlobalFree 4555->4558 4559 4066a1 GlobalFree 4555->4559 4560 4066aa GlobalAlloc 4555->4560 4556->4547 4557->4555 4557->4556 4558->4557 4559->4560 4560->4555 4560->4556 4562 403bc2 4561->4562 4578 405ff7 wsprintfA 4562->4578 4564 403c33 4565 403c67 18 API calls 4564->4565 4567 403c38 4565->4567 4566 40396e 4566->4393 4567->4566 4568 4060bb 17 API calls 4567->4568 4568->4567 4570 4041a6 SendMessageA 4569->4570 4573 4052b5 4570->4573 4571 4041a6 SendMessageA 4572 4052ee OleUninitialize 4571->4572 4572->4425 4574 401389 2 API calls 4573->4574 4575 4052dc 4573->4575 4574->4573 4575->4571 4576->4389 4577->4395 4578->4564 4580 405d54 GetShortPathNameA 4579->4580 4581 405d2e 4579->4581 4583 405e73 4580->4583 4584 405d69 4580->4584 4606 405c32 GetFileAttributesA CreateFileA 4581->4606 4583->4443 4584->4583 4586 405d71 wsprintfA 4584->4586 4585 405d38 CloseHandle GetShortPathNameA 4585->4583 4587 405d4c 4585->4587 4588 4060bb 17 API calls 4586->4588 4587->4580 4587->4583 4589 405d99 4588->4589 4607 405c32 GetFileAttributesA CreateFileA 4589->4607 4591 405da6 4591->4583 4592 405db5 GetFileSize GlobalAlloc 4591->4592 4593 405dd7 4592->4593 4594 405e6c CloseHandle 4592->4594 4595 405caa ReadFile 4593->4595 4594->4583 4596 405ddf 4595->4596 4596->4594 4608 405b97 lstrlenA 4596->4608 4599 405df6 lstrcpyA 4602 405e18 4599->4602 4600 405e0a 4601 405b97 4 API calls 4600->4601 4601->4602 4603 405e4f SetFilePointer 4602->4603 4604 405cd9 WriteFile 4603->4604 4605 405e65 GlobalFree 4604->4605 4605->4594 4606->4585 4607->4591 4609 405bd8 lstrlenA 4608->4609 4610 405be0 4609->4610 4611 405bb1 lstrcmpiA 4609->4611 4610->4599 4610->4600 4611->4610 4612 405bcf CharNextA 4611->4612 4612->4609 4613->4450 4615 405ae5 4614->4615 4617 405af5 4614->4617 4616 405af0 CharNextA 4615->4616 4615->4617 4619 405b15 4616->4619 4618 405a5c CharNextA 4617->4618 4617->4619 4618->4617 4619->4453 4619->4454 4621 403862 4620->4621 4622 40382b 4621->4622 4623 403867 FreeLibrary GlobalFree 4621->4623 4624 405861 4622->4624 4623->4622 4623->4623 4625 405b1f 18 API calls 4624->4625 4626 405881 4625->4626 4627 4058a0 4626->4627 4628 405889 DeleteFileA 4626->4628 4630 4059ce 4627->4630 4664 406099 lstrcpynA 4627->4664 4629 40362e OleUninitialize 4628->4629 4629->4283 4629->4284 4630->4629 4637 40639c 2 API calls 4630->4637 4632 4058c6 4633 4058d9 4632->4633 4634 4058cc lstrcatA 4632->4634 4636 405a78 2 API calls 4633->4636 4635 4058df 4634->4635 4639 4058ed lstrcatA 4635->4639 4641 4058f8 lstrlenA FindFirstFileA 4635->4641 4636->4635 4638 4059f2 4637->4638 4638->4629 4640 4059f6 4638->4640 4639->4641 4642 405a31 3 API calls 4640->4642 4641->4630 4647 40591c 4641->4647 4643 4059fc 4642->4643 4645 405819 5 API calls 4643->4645 4644 405a5c CharNextA 4644->4647 4646 405a08 4645->4646 4648 405a22 4646->4648 4649 405a0c 4646->4649 4647->4644 4650 4059ad FindNextFileA 4647->4650 4656 40596e 4647->4656 4665 406099 lstrcpynA 4647->4665 4652 4051c0 24 API calls 4648->4652 4649->4629 4654 4051c0 24 API calls 4649->4654 4650->4647 4653 4059c5 FindClose 4650->4653 4652->4629 4653->4630 4655 405a19 4654->4655 4657 405e78 36 API calls 4655->4657 4656->4650 4659 405861 60 API calls 4656->4659 4661 4051c0 24 API calls 4656->4661 4662 4051c0 24 API calls 4656->4662 4663 405e78 36 API calls 4656->4663 4666 405819 4656->4666 4660 405a20 4657->4660 4659->4656 4660->4629 4661->4650 4662->4656 4663->4656 4664->4632 4665->4647 4674 405c0d GetFileAttributesA 4666->4674 4669 405846 4669->4656 4670 405834 RemoveDirectoryA 4672 405842 4670->4672 4671 40583c DeleteFileA 4671->4672 4672->4669 4673 405852 SetFileAttributesA 4672->4673 4673->4669 4675 405825 4674->4675 4676 405c1f SetFileAttributesA 4674->4676 4675->4669 4675->4670 4675->4671 4676->4675 5521 401490 5522 4051c0 24 API calls 5521->5522 5523 401497 5522->5523 5524 401d95 GetDC 5525 402a9f 17 API calls 5524->5525 5526 401da7 GetDeviceCaps MulDiv ReleaseDC 5525->5526 5527 402a9f 17 API calls 5526->5527 5528 401dd8 5527->5528 5529 4060bb 17 API calls 5528->5529 5530 401e15 CreateFontIndirectA 5529->5530 5531 402577 5530->5531 5539 10001058 5541 10001074 5539->5541 5540 100010dc 5541->5540 5542 100014bb GlobalFree 5541->5542 5543 10001091 5541->5543 5542->5543 5544 100014bb GlobalFree 5543->5544 5545 100010a1 5544->5545 5546 100010b1 5545->5546 5547 100010a8 GlobalSize 5545->5547 5548 100010b5 GlobalAlloc 5546->5548 5549 100010c6 5546->5549 5547->5546 5550 100014e2 3 API calls 5548->5550 5551 100010d1 GlobalFree 5549->5551 5550->5549 5551->5540 5552 401d1a 5553 402a9f 17 API calls 5552->5553 5554 401d28 SetWindowLongA 5553->5554 5555 402951 5554->5555 5556 40491b 5557 404947 5556->5557 5558 40492b 5556->5558 5559 40497a 5557->5559 5560 40494d SHGetPathFromIDListA 5557->5560 5567 405799 GetDlgItemTextA 5558->5567 5562 404964 SendMessageA 5560->5562 5563 40495d 5560->5563 5562->5559 5565 40140b 2 API calls 5563->5565 5564 404938 SendMessageA 5564->5557 5565->5562 5567->5564 4749 40159d 4750 402ac1 17 API calls 4749->4750 4751 4015a4 SetFileAttributesA 4750->4751 4752 4015b6 4751->4752 5573 40149d 5574 4022e1 5573->5574 5575 4014ab PostQuitMessage 5573->5575 5575->5574 5576 401a1e 5577 402ac1 17 API calls 5576->5577 5578 401a27 ExpandEnvironmentStringsA 5577->5578 5579 401a3b 5578->5579 5581 401a4e 5578->5581 5580 401a40 lstrcmpA 5579->5580 5579->5581 5580->5581 5582 40171f 5583 402ac1 17 API calls 5582->5583 5584 401726 SearchPathA 5583->5584 5585 401741 5584->5585 5586 100010e0 5589 1000110e 5586->5589 5587 100011c4 GlobalFree 5588 100012ad 2 API calls 5588->5589 5589->5587 5589->5588 5590 100011c3 5589->5590 5591 100011ea GlobalFree 5589->5591 5592 10001266 2 API calls 5589->5592 5593 10001155 GlobalAlloc 5589->5593 5594 100012d1 lstrcpyA 5589->5594 5595 100011b1 GlobalFree 5589->5595 5590->5587 5591->5589 5592->5595 5593->5589 5594->5589 5595->5589 5596 10002162 5597 100021c0 5596->5597 5599 100021f6 5596->5599 5598 100021d2 GlobalAlloc 5597->5598 5597->5599 5598->5597 4770 4042a3 4771 4043c5 4770->4771 4772 4042b9 4770->4772 4773 404434 4771->4773 4778 4044fe 4771->4778 4782 404409 GetDlgItem SendMessageA 4771->4782 4776 40415a 18 API calls 4772->4776 4775 40443e GetDlgItem 4773->4775 4773->4778 4777 4044bc 4775->4777 4781 404454 4775->4781 4779 40430f 4776->4779 4777->4778 4787 4044ce 4777->4787 4780 4041c1 8 API calls 4778->4780 4783 40415a 18 API calls 4779->4783 4785 4044f9 4780->4785 4781->4777 4786 40447a SendMessageA LoadCursorA SetCursor 4781->4786 4807 40417c KiUserCallbackDispatcher 4782->4807 4784 40431c CheckDlgButton 4783->4784 4805 40417c KiUserCallbackDispatcher 4784->4805 4802 404547 4786->4802 4791 4044d4 SendMessageA 4787->4791 4792 4044e5 4787->4792 4791->4792 4792->4785 4796 4044eb SendMessageA 4792->4796 4793 40442f 4808 404523 4793->4808 4794 40433a GetDlgItem 4806 40418f SendMessageA 4794->4806 4796->4785 4799 404350 SendMessageA 4800 404377 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4799->4800 4801 40436e GetSysColor 4799->4801 4800->4785 4801->4800 4811 40577b ShellExecuteExA 4802->4811 4804 4044ad LoadCursorA SetCursor 4804->4777 4805->4794 4806->4799 4807->4793 4809 404531 4808->4809 4810 404536 SendMessageA 4808->4810 4809->4810 4810->4773 4811->4804 4812 401e25 4813 402a9f 17 API calls 4812->4813 4814 401e2b 4813->4814 4815 402a9f 17 API calls 4814->4815 4816 401e37 4815->4816 4817 401e43 ShowWindow 4816->4817 4818 401e4e EnableWindow 4816->4818 4819 402951 4817->4819 4818->4819 5600 406725 5601 4065a9 5600->5601 5602 406f14 5601->5602 5603 406633 GlobalAlloc 5601->5603 5604 40662a GlobalFree 5601->5604 5605 4066a1 GlobalFree 5601->5605 5606 4066aa GlobalAlloc 5601->5606 5603->5601 5603->5602 5604->5603 5605->5606 5606->5601 5606->5602 5607 4064a6 WaitForSingleObject 5608 4064c0 5607->5608 5609 4064d2 GetExitCodeProcess 5608->5609 5610 40646d 2 API calls 5608->5610 5611 4064c7 WaitForSingleObject 5610->5611 5611->5608 5612 4038a7 5613 4038b2 5612->5613 5614 4038b9 GlobalAlloc 5613->5614 5615 4038b6 5613->5615 5614->5615 5616 401f2b 5617 402ac1 17 API calls 5616->5617 5618 401f32 5617->5618 5619 40639c 2 API calls 5618->5619 5620 401f38 5619->5620 5622 401f4a 5620->5622 5623 405ff7 wsprintfA 5620->5623 5623->5622 5624 40292c SendMessageA 5625 402951 5624->5625 5626 402946 InvalidateRect 5624->5626 5626->5625 5634 4026b4 5635 4026ba 5634->5635 5636 402951 5635->5636 5637 4026c2 FindClose 5635->5637 5637->5636 5638 405134 5639 405144 5638->5639 5640 405158 5638->5640 5641 4051a1 5639->5641 5642 40514a 5639->5642 5643 405160 IsWindowVisible 5640->5643 5649 405177 5640->5649 5644 4051a6 CallWindowProcA 5641->5644 5645 4041a6 SendMessageA 5642->5645 5643->5641 5646 40516d 5643->5646 5647 405154 5644->5647 5645->5647 5651 404a8b SendMessageA 5646->5651 5649->5644 5656 404b0b 5649->5656 5652 404aea SendMessageA 5651->5652 5653 404aae GetMessagePos ScreenToClient SendMessageA 5651->5653 5654 404ae2 5652->5654 5653->5654 5655 404ae7 5653->5655 5654->5649 5655->5652 5665 406099 lstrcpynA 5656->5665 5658 404b1e 5666 405ff7 wsprintfA 5658->5666 5660 404b28 5661 40140b 2 API calls 5660->5661 5662 404b31 5661->5662 5667 406099 lstrcpynA 5662->5667 5664 404b38 5664->5641 5665->5658 5666->5660 5667->5664 5668 402736 5669 402ac1 17 API calls 5668->5669 5670 402744 5669->5670 5671 40275a 5670->5671 5672 402ac1 17 API calls 5670->5672 5673 405c0d 2 API calls 5671->5673 5672->5671 5674 402760 5673->5674 5696 405c32 GetFileAttributesA CreateFileA 5674->5696 5676 40276d 5677 402816 5676->5677 5678 402779 GlobalAlloc 5676->5678 5681 402831 5677->5681 5682 40281e DeleteFileA 5677->5682 5679 402792 5678->5679 5680 40280d CloseHandle 5678->5680 5697 4032c5 SetFilePointer 5679->5697 5680->5677 5682->5681 5684 402798 5685 4032af ReadFile 5684->5685 5686 4027a1 GlobalAlloc 5685->5686 5687 4027b1 5686->5687 5688 4027eb 5686->5688 5689 40303e 44 API calls 5687->5689 5690 405cd9 WriteFile 5688->5690 5695 4027be 5689->5695 5691 4027f7 GlobalFree 5690->5691 5692 40303e 44 API calls 5691->5692 5693 40280a 5692->5693 5693->5680 5694 4027e2 GlobalFree 5694->5688 5695->5694 5696->5676 5697->5684 5698 4014b7 5699 4014bd 5698->5699 5700 401389 2 API calls 5699->5700 5701 4014c5 5700->5701 5702 401b39 5703 402ac1 17 API calls 5702->5703 5704 401b40 5703->5704 5705 402a9f 17 API calls 5704->5705 5706 401b49 wsprintfA 5705->5706 5707 402951 5706->5707 4853 40233a 4854 402ac1 17 API calls 4853->4854 4855 40234b 4854->4855 4856 402ac1 17 API calls 4855->4856 4857 402354 4856->4857 4858 402ac1 17 API calls 4857->4858 4859 40235e GetPrivateProfileStringA 4858->4859 4889 4015bb 4890 402ac1 17 API calls 4889->4890 4891 4015c2 4890->4891 4892 405aca 4 API calls 4891->4892 4904 4015ca 4892->4904 4893 401624 4895 401652 4893->4895 4896 401629 4893->4896 4894 405a5c CharNextA 4894->4904 4899 401423 24 API calls 4895->4899 4897 401423 24 API calls 4896->4897 4898 401630 4897->4898 4908 406099 lstrcpynA 4898->4908 4905 40164a 4899->4905 4901 405703 2 API calls 4901->4904 4902 405720 5 API calls 4902->4904 4903 40163b SetCurrentDirectoryA 4903->4905 4904->4893 4904->4894 4904->4901 4904->4902 4906 40160c GetFileAttributesA 4904->4906 4907 405686 4 API calls 4904->4907 4906->4904 4907->4904 4908->4903 4909 4016bb 4910 402ac1 17 API calls 4909->4910 4911 4016c1 GetFullPathNameA 4910->4911 4912 4016d8 4911->4912 4918 4016f9 4911->4918 4915 40639c 2 API calls 4912->4915 4912->4918 4913 402951 4914 40170d GetShortPathNameA 4914->4913 4916 4016e9 4915->4916 4916->4918 4919 406099 lstrcpynA 4916->4919 4918->4913 4918->4914 4919->4918 5708 401d3b GetDlgItem GetClientRect 5709 402ac1 17 API calls 5708->5709 5710 401d6b LoadImageA SendMessageA 5709->5710 5711 402951 5710->5711 5712 401d89 DeleteObject 5710->5712 5712->5711 5713 404b3d GetDlgItem GetDlgItem 5714 404b8f 7 API calls 5713->5714 5721 404da7 5713->5721 5715 404c32 DeleteObject 5714->5715 5716 404c25 SendMessageA 5714->5716 5717 404c3b 5715->5717 5716->5715 5719 404c72 5717->5719 5720 4060bb 17 API calls 5717->5720 5718 404e8b 5723 404f37 5718->5723 5728 404d9a 5718->5728 5729 404ee4 SendMessageA 5718->5729 5722 40415a 18 API calls 5719->5722 5724 404c54 SendMessageA SendMessageA 5720->5724 5721->5718 5732 404a8b 5 API calls 5721->5732 5749 404e18 5721->5749 5727 404c86 5722->5727 5725 404f41 SendMessageA 5723->5725 5726 404f49 5723->5726 5724->5717 5725->5726 5737 404f62 5726->5737 5738 404f5b ImageList_Destroy 5726->5738 5742 404f72 5726->5742 5733 40415a 18 API calls 5727->5733 5730 4041c1 8 API calls 5728->5730 5729->5728 5735 404ef9 SendMessageA 5729->5735 5736 40512d 5730->5736 5731 404e7d SendMessageA 5731->5718 5732->5749 5745 404c94 5733->5745 5734 4050e1 5734->5728 5743 4050f3 ShowWindow GetDlgItem ShowWindow 5734->5743 5739 404f0c 5735->5739 5740 404f6b GlobalFree 5737->5740 5737->5742 5738->5737 5751 404f1d SendMessageA 5739->5751 5740->5742 5741 404d68 GetWindowLongA SetWindowLongA 5744 404d81 5741->5744 5742->5734 5746 404fad 5742->5746 5758 404b0b 4 API calls 5742->5758 5743->5728 5747 404d87 ShowWindow 5744->5747 5748 404d9f 5744->5748 5745->5741 5750 404ce3 SendMessageA 5745->5750 5752 404d62 5745->5752 5756 404d30 SendMessageA 5745->5756 5757 404d1f SendMessageA 5745->5757 5753 404ff1 5746->5753 5761 404fdb SendMessageA 5746->5761 5764 40418f SendMessageA 5747->5764 5765 40418f SendMessageA 5748->5765 5749->5718 5749->5731 5750->5745 5751->5723 5752->5741 5752->5744 5759 4050b7 InvalidateRect 5753->5759 5763 405065 SendMessageA SendMessageA 5753->5763 5756->5745 5757->5745 5758->5746 5759->5734 5760 4050cd 5759->5760 5762 404a46 20 API calls 5760->5762 5761->5753 5762->5734 5763->5753 5764->5728 5765->5721

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 40330d-40334c SetErrorMode GetVersion 1 40334e-403356 call 406431 0->1 2 40335f 0->2 1->2 7 403358 1->7 4 403364-403377 call 4063c3 lstrlenA 2->4 9 403379-403395 call 406431 * 3 4->9 7->2 16 4033a6-403406 #17 OleInitialize SHGetFileInfoA call 406099 GetCommandLineA call 406099 GetModuleHandleA 9->16 17 403397-40339d 9->17 24 403412-403427 call 405a5c CharNextA 16->24 25 403408-40340d 16->25 17->16 21 40339f 17->21 21->16 28 4034ec-4034f0 24->28 25->24 29 4034f6 28->29 30 40342c-40342f 28->30 33 403509-403523 GetTempPathA call 4032dc 29->33 31 403431-403435 30->31 32 403437-40343f 30->32 31->31 31->32 34 403441-403442 32->34 35 403447-40344a 32->35 43 403525-403543 GetWindowsDirectoryA lstrcatA call 4032dc 33->43 44 40357b-403595 DeleteFileA call 402d98 33->44 34->35 37 403450-403454 35->37 38 4034dc-4034e9 call 405a5c 35->38 41 403456-40345c 37->41 42 40346c-403499 37->42 38->28 53 4034eb 38->53 47 403462 41->47 48 40345e-403460 41->48 49 40349b-4034a1 42->49 50 4034ac-4034da 42->50 43->44 61 403545-403575 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032dc 43->61 58 403629-403639 call 4037f7 OleUninitialize 44->58 59 40359b-4035a1 44->59 47->42 48->42 48->47 55 4034a3-4034a5 49->55 56 4034a7 49->56 50->38 52 4034f8-403504 call 406099 50->52 52->33 53->28 55->50 55->56 56->50 72 40375d-403763 58->72 73 40363f-40364f call 4057b5 ExitProcess 58->73 63 4035a3-4035ae call 405a5c 59->63 64 403619-403620 call 4038e9 59->64 61->44 61->58 76 4035b0-4035d9 63->76 77 4035e4-4035ee 63->77 70 403625 64->70 70->58 74 403765-40377e GetCurrentProcess OpenProcessToken 72->74 75 4037df-4037e7 72->75 79 4037b0-4037be call 406431 74->79 80 403780-4037aa LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4037e9 75->82 83 4037ed-4037f1 ExitProcess 75->83 81 4035db-4035dd 76->81 84 4035f0-4035fd call 405b1f 77->84 85 403655-403669 call 405720 lstrcatA 77->85 97 4037c0-4037ca 79->97 98 4037cc-4037d6 ExitWindowsEx 79->98 80->79 81->77 88 4035df-4035e2 81->88 82->83 84->58 94 4035ff-403615 call 406099 * 2 84->94 95 403676-403690 lstrcatA lstrcmpiA 85->95 96 40366b-403671 lstrcatA 85->96 88->77 88->81 94->64 95->58 100 403692-403695 95->100 96->95 97->98 101 4037d8-4037da call 40140b 97->101 98->75 98->101 103 403697-40369c call 405686 100->103 104 40369e call 405703 100->104 101->75 112 4036a3-4036b0 SetCurrentDirectoryA 103->112 104->112 113 4036b2-4036b8 call 406099 112->113 114 4036bd-4036e5 call 406099 112->114 113->114 118 4036eb-403707 call 4060bb DeleteFileA 114->118 121 403748-40374f 118->121 122 403709-403719 CopyFileA 118->122 121->118 124 403751-403758 call 405e78 121->124 122->121 123 40371b-403734 call 405e78 call 4060bb call 405738 122->123 132 403739-40373b 123->132 124->58 132->121 133 40373d-403744 CloseHandle 132->133 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 00403332
                              • GetVersion.KERNEL32 ref: 00403338
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033A7
                              • OleInitialize.OLE32(00000000), ref: 004033AE
                              • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033CA
                              • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033DF
                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",00000000,?,00000006,00000008,0000000A), ref: 004033F2
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",00000020,?,00000006,00000008,0000000A), ref: 0040341D
                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040351A
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 0040352B
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403537
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040354B
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403553
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403564
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040356C
                              • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403580
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004038E9: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75573410), ref: 004039D9
                                • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                                • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                                • Part of subcall function 004038E9: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing), ref: 00403A40
                                • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002A8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002C0,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040362E
                              • ExitProcess.KERNEL32 ref: 0040364F
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040376C
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                              • ExitProcess.KERNEL32 ref: 004037F1
                                • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                              • String ID: "$"C:\Users\user\Desktop\aMfizaMilo.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\aMfizaMilo.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3704715180-1173193027
                              • Opcode ID: 6fb2701c2198554de983d489162d70f6248e26c12371a32bdff927a978f2d77a
                              • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                              • Opcode Fuzzy Hash: 6fb2701c2198554de983d489162d70f6248e26c12371a32bdff927a978f2d77a
                              • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 4052fe-40531a 135 405320-4053e7 GetDlgItem * 3 call 40418f call 404a5e GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4054a9-4054af 134->136 158 405405-405408 135->158 159 4053e9-405403 SendMessageA * 2 135->159 138 4054b1-4054d3 GetDlgItem CreateThread FindCloseChangeNotification 136->138 139 4054d9-4054e5 136->139 138->139 141 405507-40550d 139->141 142 4054e7-4054ed 139->142 143 405562-405565 141->143 144 40550f-405515 141->144 146 405528-40552f call 4041c1 142->146 147 4054ef-405502 ShowWindow * 2 call 40418f 142->147 143->146 152 405567-40556d 143->152 148 405517-405523 call 404133 144->148 149 40553b-40554b ShowWindow 144->149 155 405534-405538 146->155 147->141 148->146 156 40555b-40555d call 404133 149->156 157 40554d-405556 call 4051c0 149->157 152->146 160 40556f-405582 SendMessageA 152->160 156->143 157->156 163 405418-40542f call 40415a 158->163 164 40540a-405416 SendMessageA 158->164 159->158 165 405588-4055b4 CreatePopupMenu call 4060bb AppendMenuA 160->165 166 40567f-405681 160->166 173 405431-405445 ShowWindow 163->173 174 405465-405486 GetDlgItem SendMessageA 163->174 164->163 171 4055b6-4055c6 GetWindowRect 165->171 172 4055c9-4055df TrackPopupMenu 165->172 166->155 171->172 172->166 175 4055e5-4055ff 172->175 176 405454 173->176 177 405447-405452 ShowWindow 173->177 174->166 178 40548c-4054a4 SendMessageA * 2 174->178 179 405604-40561f SendMessageA 175->179 180 40545a-405460 call 40418f 176->180 177->180 178->166 179->179 181 405621-405641 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 405643-405663 SendMessageA 181->183 183->183 184 405665-405679 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->166
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 0040535D
                              • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                              • GetClientRect.USER32(?,?), ref: 004053A9
                              • GetSystemMetrics.USER32(00000002), ref: 004053B0
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                              • ShowWindow.USER32(?,00000008), ref: 0040544C
                              • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                              • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                                • Part of subcall function 0040418F: SendMessageA.USER32(00000028,?,?,00403FBF), ref: 0040419D
                              • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054D3
                              • ShowWindow.USER32(00000000), ref: 004054F6
                              • ShowWindow.USER32(?,00000008), ref: 004054FD
                              • ShowWindow.USER32(00000008), ref: 00405543
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                              • CreatePopupMenu.USER32 ref: 00405588
                              • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 0040559D
                              • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055D6
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                              • OpenClipboard.USER32(00000000), ref: 00405622
                              • EmptyClipboard.USER32 ref: 00405628
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                              • GlobalLock.KERNEL32(00000000), ref: 0040563B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                              • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                              • SetClipboardData.USER32(?,00000000), ref: 00405673
                              • CloseClipboard.USER32 ref: 00405679
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                              • String ID: 0B
                              • API String ID: 4154960007-4132856435
                              • Opcode ID: 4ae86a2eb0e764239c625fe7474c6516e4a04bb5ce475004cf9a6bce91262fda
                              • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                              • Opcode Fuzzy Hash: 4ae86a2eb0e764239c625fe7474c6516e4a04bb5ce475004cf9a6bce91262fda
                              • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 497 405861-405887 call 405b1f 500 4058a0-4058a7 497->500 501 405889-40589b DeleteFileA 497->501 503 4058a9-4058ab 500->503 504 4058ba-4058ca call 406099 500->504 502 405a2a-405a2e 501->502 505 4058b1-4058b4 503->505 506 4059d8-4059dd 503->506 510 4058d9-4058da call 405a78 504->510 511 4058cc-4058d7 lstrcatA 504->511 505->504 505->506 506->502 509 4059df-4059e2 506->509 512 4059e4-4059ea 509->512 513 4059ec-4059f4 call 40639c 509->513 514 4058df-4058e2 510->514 511->514 512->502 513->502 520 4059f6-405a0a call 405a31 call 405819 513->520 518 4058e4-4058eb 514->518 519 4058ed-4058f3 lstrcatA 514->519 518->519 521 4058f8-405916 lstrlenA FindFirstFileA 518->521 519->521 535 405a22-405a25 call 4051c0 520->535 536 405a0c-405a0f 520->536 523 40591c-405933 call 405a5c 521->523 524 4059ce-4059d2 521->524 531 405935-405939 523->531 532 40593e-405941 523->532 524->506 526 4059d4 524->526 526->506 531->532 537 40593b 531->537 533 405943-405948 532->533 534 405954-405962 call 406099 532->534 538 40594a-40594c 533->538 539 4059ad-4059bf FindNextFileA 533->539 547 405964-40596c 534->547 548 405979-405984 call 405819 534->548 535->502 536->512 541 405a11-405a20 call 4051c0 call 405e78 536->541 537->532 538->534 543 40594e-405952 538->543 539->523 545 4059c5-4059c8 FindClose 539->545 541->502 543->534 543->539 545->524 547->539 550 40596e-405977 call 405861 547->550 557 4059a5-4059a8 call 4051c0 548->557 558 405986-405989 548->558 550->539 557->539 560 40598b-40599b call 4051c0 call 405e78 558->560 561 40599d-4059a3 558->561 560->539 561->539
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,75573410,75572EE0,00000000), ref: 0040588A
                              • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,75573410,75572EE0,00000000), ref: 004058D2
                              • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,75573410,75572EE0,00000000), ref: 004058F3
                              • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,75573410,75572EE0,00000000), ref: 004058F9
                              • FindFirstFileA.KERNELBASE(00421D38,?,?,?,0040A014,?,00421D38,?,?,75573410,75572EE0,00000000), ref: 0040590A
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                              • FindClose.KERNEL32(00000000), ref: 004059C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$\*.*
                              • API String ID: 2035342205-4100612337
                              • Opcode ID: 83b5a4a5d0d8edda3f8e0557dfde68d1d2535845567fb2c63194c6eb2875a849
                              • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                              • Opcode Fuzzy Hash: 83b5a4a5d0d8edda3f8e0557dfde68d1d2535845567fb2c63194c6eb2875a849
                              • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E
                              APIs
                              • CoCreateInstance.OLE32(00408408,?,?,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214D
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021FC
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers, xrefs: 0040218D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers
                              • API String ID: 123533781-2940337350
                              • Opcode ID: 1de0a6610444ccfce012cd9757aba54bd57a6ab52e750509d87dd78bfa4fca60
                              • Instruction ID: a4a7f3c5621d46c7608b395b9069b641d7403675325c7ae40bb0e4cab6624151
                              • Opcode Fuzzy Hash: 1de0a6610444ccfce012cd9757aba54bd57a6ab52e750509d87dd78bfa4fca60
                              • Instruction Fuzzy Hash: 89512475A00208BFCF10DFE4C988A9DBBB5EF88314F2045AAF915EB2D1DA799941CF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                              • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                              APIs
                              • FindFirstFileA.KERNELBASE(75573410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0), ref: 004063A7
                              • FindClose.KERNELBASE(00000000), ref: 004063B3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID: C:\
                              • API String ID: 2295610775-3404278061
                              • Opcode ID: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                              • Instruction ID: 7ad18ffb452888df832aaad39da4d842c40e8f76539fb63f13b43eacc156c169
                              • Opcode Fuzzy Hash: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                              • Instruction Fuzzy Hash: 7CD012316050306BC20117386E0C84B7A5C9F053307119B37F9A6F12E0D7748CB286DD
                              APIs
                              • GetTickCount.KERNEL32 ref: 0040315A
                                • Part of subcall function 004032C5: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 0040318D
                              • SetFilePointer.KERNELBASE(004FF04F,00000000,00000000,004138D8,00004000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000), ref: 00403288
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FilePointer$CountTick
                              • String ID:
                              • API String ID: 1092082344-0
                              • Opcode ID: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                              • Instruction ID: 532adb213c64d5ab3b143d976f528210e7f95c922d5c949e36f01b9cb200fd6d
                              • Opcode Fuzzy Hash: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                              • Instruction Fuzzy Hash: FD3160726442049FD710AF6AFE4896A3BECF75435A710827FE904B22F0DB389941DB9D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 185 403c86-403c98 186 403dd9-403de8 185->186 187 403c9e-403ca4 185->187 189 403e37-403e4c 186->189 190 403dea-403e32 GetDlgItem * 2 call 40415a SetClassLongA call 40140b 186->190 187->186 188 403caa-403cb3 187->188 193 403cb5-403cc2 SetWindowPos 188->193 194 403cc8-403ccb 188->194 191 403e8c-403e91 call 4041a6 189->191 192 403e4e-403e51 189->192 190->189 204 403e96-403eb1 191->204 196 403e53-403e5e call 401389 192->196 197 403e84-403e86 192->197 193->194 199 403ce5-403ceb 194->199 200 403ccd-403cdf ShowWindow 194->200 196->197 218 403e60-403e7f SendMessageA 196->218 197->191 203 404127 197->203 205 403d07-403d0a 199->205 206 403ced-403d02 DestroyWindow 199->206 200->199 213 404129-404130 203->213 211 403eb3-403eb5 call 40140b 204->211 212 403eba-403ec0 204->212 208 403d0c-403d18 SetWindowLongA 205->208 209 403d1d-403d23 205->209 214 404104-40410a 206->214 208->213 216 403dc6-403dd4 call 4041c1 209->216 217 403d29-403d3a GetDlgItem 209->217 211->212 221 4040e5-4040fe DestroyWindow EndDialog 212->221 222 403ec6-403ed1 212->222 214->203 220 40410c-404112 214->220 216->213 223 403d59-403d5c 217->223 224 403d3c-403d53 SendMessageA IsWindowEnabled 217->224 218->213 220->203 226 404114-40411d ShowWindow 220->226 221->214 222->221 227 403ed7-403f24 call 4060bb call 40415a * 3 GetDlgItem 222->227 228 403d61-403d64 223->228 229 403d5e-403d5f 223->229 224->203 224->223 226->203 255 403f26-403f2b 227->255 256 403f2e-403f6a ShowWindow KiUserCallbackDispatcher call 40417c EnableWindow 227->256 234 403d72-403d77 228->234 235 403d66-403d6c 228->235 233 403d8f-403d94 call 404133 229->233 233->216 238 403dad-403dc0 SendMessageA 234->238 240 403d79-403d7f 234->240 235->238 239 403d6e-403d70 235->239 238->216 239->233 243 403d81-403d87 call 40140b 240->243 244 403d96-403d9f call 40140b 240->244 253 403d8d 243->253 244->216 252 403da1-403dab 244->252 252->253 253->233 255->256 259 403f6c-403f6d 256->259 260 403f6f 256->260 261 403f71-403f9f GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403fa1-403fb2 SendMessageA 261->262 263 403fb4 261->263 264 403fba-403ff4 call 40418f call 403c67 call 406099 lstrlenA call 4060bb SetWindowTextA call 401389 262->264 263->264 264->204 275 403ffa-403ffc 264->275 275->204 276 404002-404006 275->276 277 404025-404039 DestroyWindow 276->277 278 404008-40400e 276->278 277->214 279 40403f-40406c CreateDialogParamA 277->279 278->203 280 404014-40401a 278->280 279->214 281 404072-4040c9 call 40415a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->204 282 404020 280->282 281->203 287 4040cb-4040de ShowWindow call 4041a6 281->287 282->203 289 4040e3 287->289 289->214
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                              • ShowWindow.USER32(?), ref: 00403CDF
                              • DestroyWindow.USER32 ref: 00403CF3
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                              • GetDlgItem.USER32(?,?), ref: 00403D30
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                              • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                              • GetDlgItem.USER32(?,?), ref: 00403DF9
                              • GetDlgItem.USER32(?,00000002), ref: 00403E03
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                              • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403E6E
                              • GetDlgItem.USER32(?,00000003), ref: 00403F14
                              • ShowWindow.USER32(00000000,?), ref: 00403F35
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F47
                              • EnableWindow.USER32(?,?), ref: 00403F62
                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F78
                              • EnableMenuItem.USER32(00000000), ref: 00403F7F
                              • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403F97
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                              • lstrlenA.KERNEL32(symphonized: Installing,?,symphonized: Installing,00000000), ref: 00403FD4
                              • SetWindowTextA.USER32(?,symphonized: Installing), ref: 00403FE3
                              • ShowWindow.USER32(?,0000000A), ref: 00404117
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: symphonized: Installing
                              • API String ID: 3282139019-1948955388
                              • Opcode ID: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                              • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                              • Opcode Fuzzy Hash: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                              • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 290 4038e9-403901 call 406431 293 403903-403913 call 405ff7 290->293 294 403915-403946 call 405f80 290->294 303 403969-403992 call 403bae call 405b1f 293->303 299 403948-403959 call 405f80 294->299 300 40395e-403964 lstrcatA 294->300 299->300 300->303 308 403998-40399d 303->308 309 403a19-403a21 call 405b1f 303->309 308->309 310 40399f-4039c3 call 405f80 308->310 315 403a23-403a2a call 4060bb 309->315 316 403a2f-403a54 LoadImageA 309->316 310->309 317 4039c5-4039c7 310->317 315->316 319 403ad5-403add call 40140b 316->319 320 403a56-403a86 RegisterClassA 316->320 321 4039d8-4039e4 lstrlenA 317->321 322 4039c9-4039d6 call 405a5c 317->322 333 403ae7-403af2 call 403bae 319->333 334 403adf-403ae2 319->334 323 403ba4 320->323 324 403a8c-403ad0 SystemParametersInfoA CreateWindowExA 320->324 328 4039e6-4039f4 lstrcmpiA 321->328 329 403a0c-403a14 call 405a31 call 406099 321->329 322->321 327 403ba6-403bad 323->327 324->319 328->329 332 4039f6-403a00 GetFileAttributesA 328->332 329->309 336 403a02-403a04 332->336 337 403a06-403a07 call 405a78 332->337 343 403af8-403b12 ShowWindow call 4063c3 333->343 344 403b7b-403b7c call 405292 333->344 334->327 336->329 336->337 337->329 349 403b14-403b19 call 4063c3 343->349 350 403b1e-403b30 GetClassInfoA 343->350 348 403b81-403b83 344->348 351 403b85-403b8b 348->351 352 403b9d-403b9f call 40140b 348->352 349->350 356 403b32-403b42 GetClassInfoA RegisterClassA 350->356 357 403b48-403b6b DialogBoxParamA call 40140b 350->357 351->334 353 403b91-403b98 call 40140b 351->353 352->323 353->334 356->357 361 403b70-403b79 call 403839 357->361 361->327
                              APIs
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • lstrcatA.KERNEL32(1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75573410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\aMfizaMilo.exe",00000000), ref: 00403964
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75573410), ref: 004039D9
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                              • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing), ref: 00403A40
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A95
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                              • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                              • RegisterClassA.USER32(00423EC0), ref: 00403B42
                              • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$symphonized: Installing
                              • API String ID: 1975747703-2439943294
                              • Opcode ID: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                              • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                              • Opcode Fuzzy Hash: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                              • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 364 402d98-402de6 GetTickCount GetModuleFileNameA call 405c32 367 402df2-402e20 call 406099 call 405a78 call 406099 GetFileSize 364->367 368 402de8-402ded 364->368 376 402f10-402f1e call 402cf9 367->376 377 402e26-402e3d 367->377 369 403037-40303b 368->369 383 402f24-402f27 376->383 384 402fef-402ff4 376->384 378 402e41-402e4e call 4032af 377->378 379 402e3f 377->379 388 402e54-402e5a 378->388 389 402fab-402fb3 call 402cf9 378->389 379->378 386 402f53-402f9f GlobalAlloc call 406556 call 405c61 CreateFileA 383->386 387 402f29-402f41 call 4032c5 call 4032af 383->387 384->369 414 402fa1-402fa6 386->414 415 402fb5-402fe5 call 4032c5 call 40303e 386->415 387->384 412 402f47-402f4d 387->412 392 402eda-402ede 388->392 393 402e5c-402e74 call 405bed 388->393 389->384 396 402ee0-402ee6 call 402cf9 392->396 397 402ee7-402eed 392->397 393->397 411 402e76-402e7d 393->411 396->397 403 402f00-402f0a 397->403 404 402eef-402efd call 4064e8 397->404 403->376 403->377 404->403 411->397 416 402e7f-402e86 411->416 412->384 412->386 414->369 424 402fea-402fed 415->424 416->397 418 402e88-402e8f 416->418 418->397 420 402e91-402e98 418->420 420->397 422 402e9a-402eba 420->422 422->384 423 402ec0-402ec4 422->423 425 402ec6-402eca 423->425 426 402ecc-402ed4 423->426 424->384 427 402ff6-403007 424->427 425->376 425->426 426->397 428 402ed6-402ed8 426->428 429 403009 427->429 430 40300f-403014 427->430 428->397 429->430 431 403015-40301b 430->431 431->431 432 40301d-403035 call 405bed 431->432 432->369
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402DAC
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\aMfizaMilo.exe,00000400), ref: 00402DC8
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                              • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\aMfizaMilo.exe,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00402E11
                              • GlobalAlloc.KERNELBASE(00000040,0040A130), ref: 00402F58
                              Strings
                              • soft, xrefs: 00402E88
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DA2, 00402F70
                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FA1
                              • Inst, xrefs: 00402E7F
                              • "C:\Users\user\Desktop\aMfizaMilo.exe", xrefs: 00402D98
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FEF
                              • C:\Users\user\Desktop, xrefs: 00402DF3, 00402DF8, 00402DFE
                              • Error launching installer, xrefs: 00402DE8
                              • Null, xrefs: 00402E91
                              • C:\Users\user\Desktop\aMfizaMilo.exe, xrefs: 00402DB2, 00402DC1, 00402DD5, 00402DF2
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\aMfizaMilo.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-969534204
                              • Opcode ID: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                              • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                              • Opcode Fuzzy Hash: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                              • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 435 4060bb-4060c6 436 4060c8-4060d7 435->436 437 4060d9-4060ef 435->437 436->437 438 4062e0-4062e4 437->438 439 4060f5-406100 437->439 441 406112-40611c 438->441 442 4062ea-4062f4 438->442 439->438 440 406106-40610d 439->440 440->438 441->442 443 406122-406129 441->443 444 4062f6-4062fa call 406099 442->444 445 4062ff-406300 442->445 446 4062d3 443->446 447 40612f-406163 443->447 444->445 449 4062d5-4062db 446->449 450 4062dd-4062df 446->450 451 406280-406283 447->451 452 406169-406173 447->452 449->438 450->438 455 4062b3-4062b6 451->455 456 406285-406288 451->456 453 406175-406179 452->453 454 40618d 452->454 453->454 459 40617b-40617f 453->459 462 406194-40619b 454->462 457 4062c4-4062d1 lstrlenA 455->457 458 4062b8-4062bf call 4060bb 455->458 460 406298-4062a4 call 406099 456->460 461 40628a-406296 call 405ff7 456->461 457->438 458->457 459->454 464 406181-406185 459->464 471 4062a9-4062af 460->471 461->471 466 4061a0-4061a2 462->466 467 40619d-40619f 462->467 464->454 472 406187-40618b 464->472 469 4061a4-4061bf call 405f80 466->469 470 4061db-4061de 466->470 467->466 478 4061c4-4061c7 469->478 476 4061e0-4061ec GetSystemDirectoryA 470->476 477 4061ee-4061f1 470->477 471->457 475 4062b1 471->475 472->462 479 406278-40627e call 406303 475->479 480 406262-406265 476->480 481 4061f3-406201 GetWindowsDirectoryA 477->481 482 40625e-406260 477->482 483 406267-40626b 478->483 484 4061cd-4061d6 call 4060bb 478->484 479->457 480->479 480->483 481->482 482->480 485 406203-40620d 482->485 483->479 488 40626d-406273 lstrcatA 483->488 484->480 490 406227-40623d SHGetSpecialFolderLocation 485->490 491 40620f-406212 485->491 488->479 492 40625b 490->492 493 40623f-406259 SHGetPathFromIDListA CoTaskMemFree 490->493 491->490 495 406214-40621b 491->495 492->482 493->480 493->492 496 406223-406225 495->496 496->480 496->490
                              APIs
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004061E6
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000), ref: 004061F9
                              • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000), ref: 00406235
                              • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00406243
                              • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,00000000), ref: 004062C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-227249755
                              • Opcode ID: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                              • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                              • Opcode Fuzzy Hash: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                              • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E

                              Control-flow Graph

                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers$C:\Users\user\AppData\Local\Temp\nsj6345.tmp$C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll$Call
                              • API String ID: 1941528284-2708113011
                              • Opcode ID: e928e46396d8dc3c4a4bdb24082dd825f8b0ff1d663bcc8c2bbd70b8c757518f
                              • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                              • Opcode Fuzzy Hash: e928e46396d8dc3c4a4bdb24082dd825f8b0ff1d663bcc8c2bbd70b8c757518f
                              • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 633 4051c0-4051d5 634 40528b-40528f 633->634 635 4051db-4051ed 633->635 636 4051f8-405204 lstrlenA 635->636 637 4051ef-4051f3 call 4060bb 635->637 639 405221-405225 636->639 640 405206-405216 lstrlenA 636->640 637->636 641 405234-405238 639->641 642 405227-40522e SetWindowTextA 639->642 640->634 643 405218-40521c lstrcatA 640->643 644 40523a-40527c SendMessageA * 3 641->644 645 40527e-405280 641->645 642->641 643->639 644->645 645->634 646 405282-405285 645->646 646->634
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll), ref: 0040522E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll
                              • API String ID: 2531174081-574718741
                              • Opcode ID: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                              • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                              • Opcode Fuzzy Hash: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                              • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 647 405686-4056d1 CreateDirectoryA 648 4056d3-4056d5 647->648 649 4056d7-4056e4 GetLastError 647->649 650 4056fe-405700 648->650 649->650 651 4056e6-4056fa SetFileSecurityA 649->651 651->648 652 4056fc GetLastError 651->652 652->650
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                              • GetLastError.KERNEL32 ref: 004056DD
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                              • GetLastError.KERNEL32 ref: 004056FC
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004056AC
                              • C:\Users\user\Desktop, xrefs: 00405686
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                              • API String ID: 3449924974-1326413622
                              • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                              • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 653 4063c3-4063e3 GetSystemDirectoryA 654 4063e5 653->654 655 4063e7-4063e9 653->655 654->655 656 4063f9-4063fb 655->656 657 4063eb-4063f3 655->657 659 4063fc-40642e wsprintfA LoadLibraryExA 656->659 657->656 658 4063f5-4063f7 657->658 658->659
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                              • wsprintfA.USER32 ref: 00406413
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406427
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                              • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 660 405c61-405c6b 661 405c6c-405c97 GetTickCount GetTempFileNameA 660->661 662 405ca6-405ca8 661->662 663 405c99-405c9b 661->663 665 405ca0-405ca3 662->665 663->661 664 405c9d 663->664 664->665
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405C75
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405C8F
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C64
                              • "C:\Users\user\Desktop\aMfizaMilo.exe", xrefs: 00405C61
                              • nsa, xrefs: 00405C6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-1970039182
                              • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                              • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 666 100016bd-100016f9 call 10001a5d 670 1000180a-1000180c 666->670 671 100016ff-10001703 666->671 672 10001705-1000170b call 100021b0 671->672 673 1000170c-10001719 call 100021fa 671->673 672->673 678 10001749-10001750 673->678 679 1000171b-10001720 673->679 680 10001770-10001774 678->680 681 10001752-1000176e call 100023d8 call 10001559 call 10001266 GlobalFree 678->681 682 10001722-10001723 679->682 683 1000173b-1000173e 679->683 684 100017b2-100017b8 call 100023d8 680->684 685 10001776-100017b0 call 10001559 call 100023d8 680->685 706 100017b9-100017bd 681->706 688 10001725-10001726 682->688 689 1000172b-1000172c call 100027e4 682->689 683->678 686 10001740-10001741 call 10002a9f 683->686 684->706 685->706 699 10001746 686->699 694 10001733-10001739 call 10002587 688->694 695 10001728-10001729 688->695 702 10001731 689->702 705 10001748 694->705 695->678 695->689 699->705 702->699 705->678 709 100017fa-10001801 706->709 710 100017bf-100017cd call 1000239e 706->710 709->670 712 10001803-10001804 GlobalFree 709->712 716 100017e5-100017ec 710->716 717 100017cf-100017d2 710->717 712->670 716->709 718 100017ee-100017f9 call 100014e2 716->718 717->716 719 100017d4-100017dc 717->719 718->709 719->716 721 100017de-100017df FreeLibrary 719->721 721->716
                              APIs
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001768
                              • FreeLibrary.KERNEL32(?), ref: 100017DF
                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                                • Part of subcall function 10002587: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025F9
                                • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarylstrcpy
                              • String ID:
                              • API String ID: 1791698881-3916222277
                              • Opcode ID: d00fcf5c1a7409290317dea9c84c75534a881091bfcc635988d0727071c870ea
                              • Instruction ID: 474564f2ddd1a30fda7ef2e88bb39d7445f8f4f5c00c78564696995dcbc9c57a
                              • Opcode Fuzzy Hash: d00fcf5c1a7409290317dea9c84c75534a881091bfcc635988d0727071c870ea
                              • Instruction Fuzzy Hash: C4319E79408205DAFB41DF649CC5BCA37ECFB042D5F118465FA0A9A09EDF78A8858B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 723 401c04-401c24 call 402a9f * 2 728 401c30-401c34 723->728 729 401c26-401c2d call 402ac1 723->729 731 401c40-401c46 728->731 732 401c36-401c3d call 402ac1 728->732 729->728 735 401c94-401cba call 402ac1 * 2 FindWindowExA 731->735 736 401c48-401c64 call 402a9f * 2 731->736 732->731 746 401cc0 735->746 747 401c84-401c92 SendMessageA 736->747 748 401c66-401c82 SendMessageTimeoutA 736->748 749 401cc3-401cc6 746->749 747->746 748->749 750 402951-402960 749->750 751 401ccc 749->751 751->750
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                              • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 754 4023d0-402401 call 402ac1 * 2 call 402b51 761 402951-402960 754->761 762 402407-402411 754->762 764 402421-402424 762->764 765 402413-402420 call 402ac1 lstrlenA 762->765 766 402426-402437 call 402a9f 764->766 767 402438-40243b 764->767 765->764 766->767 771 40244c-402460 RegSetValueExA 767->771 772 40243d-402447 call 40303e 767->772 776 402462 771->776 777 402465-402542 RegCloseKey 771->777 772->771 776->777 777->761 779 402716-40271d 777->779 779->761
                              APIs
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj6345.tmp,00000023,00000011,00000002), ref: 0040241B
                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsj6345.tmp,00000000,00000011,00000002), ref: 00402458
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj6345.tmp,00000000,00000011,00000002), ref: 0040253C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsj6345.tmp
                              • API String ID: 2655323295-1481099566
                              • Opcode ID: 21db2f8f9692a3377bee1ea49589b4a1eede1b4b6c2deebe6580fb317b003819
                              • Instruction ID: f5012b3eed6b0e10d725da1925ea8f3c2a7a7eca851d842cc00ee1163223ef4a
                              • Opcode Fuzzy Hash: 21db2f8f9692a3377bee1ea49589b4a1eede1b4b6c2deebe6580fb317b003819
                              • Instruction Fuzzy Hash: DA115471E00215BEDF10EFA5DE89A9E7A74EB44754F21403BF508F71D1CAB84D419B29
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 00402028
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 00402038
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 004020B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 88fa0b6539cab5ee48bbf94d2f3b0766d4e8639ddc33a2ee3b91e77515055371
                              • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                              • Opcode Fuzzy Hash: 88fa0b6539cab5ee48bbf94d2f3b0766d4e8639ddc33a2ee3b91e77515055371
                              • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                              • RegCloseKey.ADVAPI32(?), ref: 00402C22
                              • RegCloseKey.ADVAPI32(?), ref: 00402C43
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                              • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                              • Opcode Fuzzy Hash: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                              • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                              APIs
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                • Part of subcall function 00405686: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers,00000000,00000000,000000F0), ref: 0040163C
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers
                              • API String ID: 1892508949-2940337350
                              • Opcode ID: a1a99da81ec8ebe60bd9a559002f25b092f8fa51d43cb1406a9a8f8e6d1f3ea0
                              • Instruction ID: e80d591928eb94818456189605928617e464058bd7b4ab9a9bc67e70efbf424e
                              • Opcode Fuzzy Hash: a1a99da81ec8ebe60bd9a559002f25b092f8fa51d43cb1406a9a8f8e6d1f3ea0
                              • Instruction Fuzzy Hash: D3112731208151EBCF217BB54D415BF26B0DA92324B28093FE9D1B22E2D63D4D436A3F
                              APIs
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0,00000000), ref: 00405B72
                              • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0), ref: 00405B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\
                              • API String ID: 3248276644-3404278061
                              • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                              • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                              APIs
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,004061C4,80000002), ref: 00405FC6
                              • RegCloseKey.KERNELBASE(?,?,004061C4,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll), ref: 00405FD1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID: Call
                              • API String ID: 3356406503-1824292864
                              • Opcode ID: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                              • Instruction ID: 18c902175c261954d743b78889848fcc164f2ce977d73a6ea322bbd2e465ffc2
                              • Opcode Fuzzy Hash: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                              • Instruction Fuzzy Hash: CD01BC7250020AABDF228F20CC09FDB3FA8EF54364F00403AFA05A2190D278CA14DFA8
                              APIs
                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                              • CloseHandle.KERNEL32(?), ref: 0040576E
                              Strings
                              • Error launching installer, xrefs: 0040574B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                              • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                              • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                              • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                              • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                              • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                              • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                              • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                              • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                              APIs
                                • Part of subcall function 0040639C: FindFirstFileA.KERNELBASE(75573410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0), ref: 004063A7
                                • Part of subcall function 0040639C: FindClose.KERNELBASE(00000000), ref: 004063B3
                              • lstrlenA.KERNEL32 ref: 00402285
                              • lstrlenA.KERNEL32(00000000), ref: 0040228F
                              • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004022B7
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FileFindlstrlen$CloseFirstOperation
                              • String ID:
                              • API String ID: 1486964399-0
                              • Opcode ID: b47fb53b0334603386ac124c2a285910fb3e70b2032b5f5d66ff835e7553619e
                              • Instruction ID: 7601fe6c075200cb0f0395ff2ba46aeb4d837e4f3c96b4285f6c21aa21cd7a5f
                              • Opcode Fuzzy Hash: b47fb53b0334603386ac124c2a285910fb3e70b2032b5f5d66ff835e7553619e
                              • Instruction Fuzzy Hash: F8117C71A14205AACB10EFF98949A9DBAF8AF44304F10403FA405FB2C2D6B8C5418B69
                              APIs
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402511
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 00402524
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj6345.tmp,00000000,00000011,00000002), ref: 0040253C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Enum$CloseValue
                              • String ID:
                              • API String ID: 397863658-0
                              • Opcode ID: 8ae0c4f3e46a3f99f64f669cb9b9086aaa963cdd8b53f875c54c26ea0aedb13f
                              • Instruction ID: 518a01c90e212b4e6c6a91e55dc37795372a660c14e02f5234546a481bba951e
                              • Opcode Fuzzy Hash: 8ae0c4f3e46a3f99f64f669cb9b9086aaa963cdd8b53f875c54c26ea0aedb13f
                              • Instruction Fuzzy Hash: 9901B171A04105AFE7159F69DE9CABF7ABCEF80348F10003EF405A61C0DAB84A419729
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ErrorFileLastRead
                              • String ID:
                              • API String ID: 1948546556-0
                              • Opcode ID: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                              • Instruction ID: 7088a7f0c219bdfd589eed4d744adbaf06b55c7882bf085a68ef70f7e309f44b
                              • Opcode Fuzzy Hash: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                              • Instruction Fuzzy Hash: 385194BA908215DFF711EF60D9C575937A8EB443E0F21842AEA08E721DDF34A9818B55
                              APIs
                              • SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 00403063
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                              • Instruction ID: d45136b7277fa4a4eeb989eab338d16e1e03b20585a5145be81ea7fda6220a17
                              • Opcode Fuzzy Hash: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                              • Instruction Fuzzy Hash: 6C314F31204259EFDB109F56DD44A9A7FA8EB08759F10803AF905FA190D378DA50DBA9
                              APIs
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040249D
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj6345.tmp,00000000,00000011,00000002), ref: 0040253C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID:
                              • API String ID: 3356406503-0
                              • Opcode ID: 25d9f08b9c25ebc335b8f4a62a016f162dacef69ee2566890a70634c7d5b4c72
                              • Instruction ID: 1b22629e75d9b419b9fa7e371b5212fc4da00fb077cffe61c988f7dc4f8aba71
                              • Opcode Fuzzy Hash: 25d9f08b9c25ebc335b8f4a62a016f162dacef69ee2566890a70634c7d5b4c72
                              • Instruction Fuzzy Hash: 5511E771A05205EEDB15DF64DA8C5BE7BB4EF05348F20403FE446B72C0D6B88A42DB29
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                              • Instruction ID: 0b9a08df0e19283e0c47f542131d218e25c17bbe1cc26e2bbd3e30b70dde81e4
                              • Opcode Fuzzy Hash: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                              • Instruction Fuzzy Hash: FD01F431B202109BE7194B389D05B6A36A8E710315F51823FF951F65F1D778CC038B4C
                              APIs
                              • GetFullPathNameA.KERNELBASE(00000000,00000400,?,?), ref: 004016CE
                              • GetShortPathNameA.KERNEL32(?,?,00000400), ref: 00401714
                                • Part of subcall function 0040639C: FindFirstFileA.KERNELBASE(75573410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0), ref: 004063A7
                                • Part of subcall function 0040639C: FindClose.KERNELBASE(00000000), ref: 004063B3
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FindNamePath$CloseFileFirstFullShortlstrcpyn
                              • String ID:
                              • API String ID: 1640102590-0
                              • Opcode ID: 32c53aecdaf04646e903b2baa330044aacde1b1b705e7e096e120a508e3d1e0b
                              • Instruction ID: 82de80e7cfd825813353c6dd873a5046ae6b5cec6a37a6b577a8a833a4ec1cb8
                              • Opcode Fuzzy Hash: 32c53aecdaf04646e903b2baa330044aacde1b1b705e7e096e120a508e3d1e0b
                              • Instruction Fuzzy Hash: C0F0A4B1700255EBCB11AB64CD84ADF3B68AF41345F14403BFA02FA1D1D7789D42976D
                              APIs
                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040239C
                              • RegCloseKey.ADVAPI32(00000000), ref: 004023A5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseDeleteValue
                              • String ID:
                              • API String ID: 2831762973-0
                              • Opcode ID: f83bd233bd8663726befb315590dbf39ea9cea469545d982e39583f4008de073
                              • Instruction ID: 4734060bda5bcd379add1307bf53be40299433fde06acb7bb12a187abd2f1290
                              • Opcode Fuzzy Hash: f83bd233bd8663726befb315590dbf39ea9cea469545d982e39583f4008de073
                              • Instruction Fuzzy Hash: 6CF09632B04111ABD710AFB89B8EABE76A89B80354F25003FEA05B71C1DAFC4D02476D
                              APIs
                              • ShowWindow.USER32(00000000,00000000), ref: 00401E43
                              • EnableWindow.USER32(00000000,00000000), ref: 00401E4E
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: 70a93260b027f2004694904072cd59400e64644bb7532fd21934b6a3ced71637
                              • Instruction ID: f710efbc4c9934798fb848b4930091ab6df2b9d686602449302b85490548aed4
                              • Opcode Fuzzy Hash: 70a93260b027f2004694904072cd59400e64644bb7532fd21934b6a3ced71637
                              • Instruction Fuzzy Hash: C8E01272B082119FD714EBB6EA495AD77B4EF40315B11403BE415F11D1DE7888419F5D
                              APIs
                              • ShowWindow.USER32(00010424), ref: 00401581
                              • ShowWindow.USER32(0001041E), ref: 00401596
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 61e2efb783f3023bff3ad6d967f60c2a1a0ca49b5590f8eabca18dd422d604b3
                              • Instruction ID: 0dda4fc35c74e8091563047f6652b1239714b114c1c6f120fbc2b65112c94b6f
                              • Opcode Fuzzy Hash: 61e2efb783f3023bff3ad6d967f60c2a1a0ca49b5590f8eabca18dd422d604b3
                              • Instruction Fuzzy Hash: 62E08672B001159BCB24DF68EDD087E77B5EB84311751053FD902B3290C6B8DD418B58
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 004063C3: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                                • Part of subcall function 004063C3: wsprintfA.USER32 ref: 00406413
                                • Part of subcall function 004063C3: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406427
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                              • Instruction ID: 56fda94a1dd54a43fb122a1991fe363568279dfba8e98efda579274c3b941564
                              • Opcode Fuzzy Hash: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                              • Instruction Fuzzy Hash: E3E086326042105AD2106BB09E0487773A89F84750302883EF946F2140D7389C75ABAE
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405C36
                              • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                              • Instruction ID: 44ec1511c7d75563636feacf23b0872b92cf9f9cc06fc18b7ec6e669f43cef59
                              • Opcode Fuzzy Hash: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                              • Instruction Fuzzy Hash: E4D09E71654201AFEF098F20DE16F2EBAA2EB84B00F11952CB682944E1DA715819AB19
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,00403300,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405709
                              • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405717
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                              • Instruction ID: 9e29868ffe2b43b7798ba1daada82999d34952ab2a4b7d437405be2737e00dc4
                              • Opcode Fuzzy Hash: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                              • Instruction Fuzzy Hash: 0DC04C30225901DADA606F249F087177994FBA0741F1144396146E30E0EA348415ED2D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                              • Instruction ID: 014ce3e67ccbc0a67955049e33e6e2fc18f0270869ac9b4e1a99f60d8e299e74
                              • Opcode Fuzzy Hash: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                              • Instruction Fuzzy Hash: CC21F970D04295BEDF318B699948AAEBF749F11304F04457FE4D0B62D5C6BE8A82CF19
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A0
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                              • Instruction ID: daba68e88d81473494fab100d986bdd4d5457abcde4f4dc52411d400b48531e4
                              • Opcode Fuzzy Hash: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                              • Instruction Fuzzy Hash: BCE09B71B04116ABD700FB95AA4997E7768DF40304F10403FF515F00C1CA7D4C025B2D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040232F
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                              • Instruction ID: f472a2c509351f333654906e099da5e6dfd11f42980ce41b172c94471a0d1cd1
                              • Opcode Fuzzy Hash: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                              • Instruction Fuzzy Hash: 8BE01A31B401246ADB207AB10E8E96E14989BC4744B29053ABE05B62C3DDBC4C414AB9
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B72,00000000,?,?), ref: 00405F76
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction ID: b8b87f9e7f23a22b038ad66cb6348727c8887116b88fbbe418bbf9d15439b9dc
                              • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction Fuzzy Hash: B4E0E67201450DBEDF095F60DD0AD7B371DEB08304F04452EFA45D4091E7B5AD209E74
                              APIs
                              • WriteFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,0040D8F9,0040B8D8,00403246,0040B8D8,0040D8F9,004138D8,00004000,?,00000000,00403070,00000004), ref: 00405CED
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction ID: e5327eed263ed0cb59b3772f759b7efddda8826228879d6768eb485b7ec61b42
                              • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction Fuzzy Hash: CEE0EC3225065AABDF509E95AD08FEB7B6CEF053A0F008837F915E2150D631E821DBA8
                              APIs
                              • ReadFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,004138D8,0040B8D8,004032C2,0040A130,0040A130,004031C6,004138D8,00004000,?,00000000,00403070), ref: 00405CBE
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                              • Instruction ID: 86bb3e2151b1fdd0dbac44507bcf00ea7ca2ece369def3772f3446380bdcc129
                              • Opcode Fuzzy Hash: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                              • Instruction Fuzzy Hash: DAE08C3220825EABEF109E508C00EEB3B6CFB00361F144432FD10E7040E230E860ABB4
                              APIs
                              • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 10002727
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction ID: e09dfa788fffc30199ef0a9f627684cb70e95bce5f527532b7ad3e980fb418b3
                              • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction Fuzzy Hash: 67F09BF19092A0DEF360DF688CC47063FE4E3983D5B03852AE358F6269EB7441448B19
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040236D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                              • Instruction ID: 8896498bc3bf22cdd75c41d4cee83ceff5cc5a9cf36b2948d6df5d4522980b60
                              • Opcode Fuzzy Hash: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                              • Instruction Fuzzy Hash: 82E08634B44308BADF10AFA19D49EAD3668AF41710F14403AFD547B0E2EEB844429B2D
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405FAD,?,?,?,?,00000002,Call), ref: 00405F43
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction ID: 49134d8a29c384089d71c2fc87a48e1db8574b6415c3e00dd087e3758e4bfdf5
                              • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction Fuzzy Hash: C1D0EC3210420ABADF119E919D01FAB371DEB04350F004426BA45E4091D779D520AE54
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 9092e01b63c1174d607e096a74ab4834703e604e2c64423c66f41cce52a313c8
                              • Instruction ID: ce3aa80a16c353682a4fc60f6c60757a41c4294f2dd63ac0650dc91194aad8f9
                              • Opcode Fuzzy Hash: 9092e01b63c1174d607e096a74ab4834703e604e2c64423c66f41cce52a313c8
                              • Instruction Fuzzy Hash: E1D0127270811197CB10DBA8AB4869D77A4EB80325B318137D515F21D1E6B9C945671D
                              APIs
                              • SendMessageA.USER32(00010418,00000000,00000000,00000000), ref: 004041B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                              • Instruction ID: 55b95b209562bae9886b89f2f6925b48322e85585088ac1ac71ede26d93296ac
                              • Opcode Fuzzy Hash: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                              • Instruction Fuzzy Hash: 77C09B717407017BEA208F509E4DF0777A96750701F2944397760F60D0C6F4D450DA1C
                              APIs
                              • ShellExecuteExA.SHELL32(?,0040457F,?), ref: 0040578A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID:
                              • API String ID: 587946157-0
                              • Opcode ID: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                              • Instruction ID: fedc52184ae6edd1acf052e6849869f1d6de8b7351bc39b82099fbd6471e80b9
                              • Opcode Fuzzy Hash: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                              • Instruction Fuzzy Hash: ECC092B2000200DFE301CF90CB18F077BE8AF55306F028058E1C49A160C7788810CB69
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                              APIs
                              • SendMessageA.USER32(00000028,?,?,00403FBF), ref: 0040419D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                              • Instruction ID: 10cfd25431557a88665167ebbf17620150c727a9bd7140e907e4ecff4ccdfc3e
                              • Opcode Fuzzy Hash: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                              • Instruction Fuzzy Hash: 30B09236280A00AAEE218B00DE09F457AA2E7A8742F028028B250240B0CAB200A1DB08
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403F58), ref: 00404186
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                              • Instruction ID: bd711969ba89efe8629f231cafa01baa053f2358784498ab8b3cf30639ef5a41
                              • Opcode Fuzzy Hash: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                              • Instruction Fuzzy Hash: 55A012320000009FCB014B50EF04C057F71AB543007018435E140400338A310821FF0C
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: c0e700f1fcdc4ffa98e8290517b670d0cf04be8f77536005ba3f54c52213854c
                              • Instruction ID: 570e0916f0090f26c7ee0a6088be2661e77b817c4cb0ee023996dcc8b23dd1f7
                              • Opcode Fuzzy Hash: c0e700f1fcdc4ffa98e8290517b670d0cf04be8f77536005ba3f54c52213854c
                              • Instruction Fuzzy Hash: 96D05E73B141518BD754EBB9BA8845E73E4EB903153214837E852E2091EA78C8424A28
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                              • GetDlgItem.USER32(?,00000408), ref: 00404B60
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BAA
                              • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                              • SetWindowLongA.USER32(?,000000FC,00405134), ref: 00404BD6
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BEA
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C30
                              • DeleteObject.GDI32(00000000), ref: 00404C33
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404D6D
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D7B
                              • ShowWindow.USER32(?,00000005), ref: 00404D8C
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F03
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F27
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404F5C
                              • GlobalFree.KERNEL32(00000000), ref: 00404F6C
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                              • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                              • InvalidateRect.USER32(?,00000000,?), ref: 004050BD
                              • ShowWindow.USER32(?,00000000), ref: 0040510B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405116
                              • ShowWindow.USER32(00000000), ref: 0040511D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                              • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                              • Opcode Fuzzy Hash: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                              • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                              • SetWindowTextA.USER32(00000000,?), ref: 00404643
                              • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                              • lstrcmpiA.KERNEL32(Call,symphonized: Installing), ref: 00404731
                              • lstrcatA.KERNEL32(?,Call), ref: 0040473D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                                • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                                • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                                • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                                • Part of subcall function 00406303: CharNextA.USER32(?,"C:\Users\user\Desktop\aMfizaMilo.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                                • Part of subcall function 00406303: CharPrevA.USER32(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,?,0041FD00,?,?,000003FB,?), ref: 0040480D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                                • Part of subcall function 00404981: lstrlenA.KERNEL32(symphonized: Installing,symphonized: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                                • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                                • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,symphonized: Installing), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$Call$symphonized: Installing
                              • API String ID: 2624150263-2687774931
                              • Opcode ID: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                              • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                              • Opcode Fuzzy Hash: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                              • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 10001B67
                              • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                              • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                              • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                              • GlobalFree.KERNEL32(?), ref: 10001CC4
                              • GlobalFree.KERNEL32(?), ref: 10001CC9
                              • GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001E76
                              • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc
                              • String ID:
                              • API String ID: 4227406936-0
                              • Opcode ID: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                              • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                              • Opcode Fuzzy Hash: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                              • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: c36892e06c5a05a47b1c83c5296ec74ed019d09ea245c2b35f81d61d6accc4a2
                              • Instruction ID: 0159b05a81fb7445ac67952f267e1ed3d95360429fb03f1bd53dceef05a54f2a
                              • Opcode Fuzzy Hash: c36892e06c5a05a47b1c83c5296ec74ed019d09ea245c2b35f81d61d6accc4a2
                              • Instruction Fuzzy Hash: EEF055727041019BC300EBB49948AEEB768DF21324F20017FE285F20C1C7B889469B3A
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 0040432E
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                              • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404360
                              • GetSysColor.USER32(?), ref: 00404371
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                              • lstrlenA.KERNEL32(?), ref: 00404392
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                              • GetDlgItem.USER32(?,0000040A), ref: 00404418
                              • SendMessageA.USER32(00000000), ref: 0040441B
                              • GetDlgItem.USER32(?,000003E8), ref: 00404446
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                              • SetCursor.USER32(00000000), ref: 0040449E
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                              • SetCursor.USER32(00000000), ref: 004044B7
                              • SendMessageA.USER32(00000111,?,00000000), ref: 004044E3
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004044F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: Call$N$nB@
                              • API String ID: 3103080414-3023683851
                              • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                              • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                              • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                              • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                              • wsprintfA.USER32 ref: 00405D7D
                              • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DB8
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DC7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                              • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                              • GlobalFree.KERNEL32(00000000), ref: 00405E66
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                              • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                              • Opcode Fuzzy Hash: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                              • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\aMfizaMilo.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                              • CharPrevA.USER32(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00406304
                              • *?|<>/":, xrefs: 0040634B
                              • "C:\Users\user\Desktop\aMfizaMilo.exe", xrefs: 0040633F
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-1071200097
                              • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                              • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                              • GetSysColor.USER32(00000000), ref: 004041FA
                              • SetTextColor.GDI32(?,00000000), ref: 00404206
                              • SetBkMode.GDI32(?,?), ref: 00404212
                              • GetSysColor.USER32(?), ref: 00404225
                              • SetBkColor.GDI32(?,?), ref: 00404235
                              • DeleteObject.GDI32(?), ref: 0040424F
                              • CreateBrushIndirect.GDI32(?), ref: 00404259
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                              • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalFree.KERNEL32(?), ref: 100024B3
                              • GlobalFree.KERNEL32(00000000), ref: 100024ED
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                              • Instruction ID: c0db1d51d0d8beb2da32add46ec64f24e8f484468aa98c5ce89375ba0c102a5a
                              • Opcode Fuzzy Hash: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                              • Instruction Fuzzy Hash: 0831A9B1504211EFF322DB94CCC4C2B7BBDEB853D4B118929FA4193228CB31AC94DB62
                              APIs
                              • DestroyWindow.USER32(00000000,00000000), ref: 00402D11
                              • GetTickCount.KERNEL32 ref: 00402D2F
                              • wsprintfA.USER32 ref: 00402D5D
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj6345.tmp\System.dll), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                                • Part of subcall function 00402CDD: MulDiv.KERNEL32(00071511,00000064,00070927), ref: 00402CF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 49248589531ca63bd1f6eb350bee73914f18f328555d002f4c75c07f849debaa
                              • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                              • Opcode Fuzzy Hash: 49248589531ca63bd1f6eb350bee73914f18f328555d002f4c75c07f849debaa
                              • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                              • GetMessagePos.USER32 ref: 00404AAE
                              • ScreenToClient.USER32(?,?), ref: 00404AC8
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID: Times New Roman
                              • API String ID: 3808545654-927190056
                              • Opcode ID: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                              • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                              • Opcode Fuzzy Hash: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                              • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                              APIs
                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C7C
                              • wsprintfA.USER32 ref: 00402CB0
                              • SetWindowTextA.USER32(?,?), ref: 00402CC0
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                              • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 10002348
                                • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C5
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022DA
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E9
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F7
                              • GlobalFree.KERNEL32(00000000), ref: 100022FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                              • Instruction ID: a642113aa4013a2ca06c871554e8d399cf46bf4099943ddf9e0960cc50565d32
                              • Opcode Fuzzy Hash: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                              • Instruction Fuzzy Hash: A941BCB1508311EFF320DF648C84B6AB7E8FF443D0F11892AF946D61A9DB34AA40CB61
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                              • GlobalFree.KERNEL32(?), ref: 004027E5
                              • GlobalFree.KERNEL32(00000000), ref: 004027F8
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: 6c7dcdf8261c9d786bb24efcf90e0f1d33b45d541b425cde03fb6c43c6f2b2c7
                              • Instruction ID: 2027d9f4b10c536beff5d97c30926d1382b99fb2686dd4663458e7dd77d5dad7
                              • Opcode Fuzzy Hash: 6c7dcdf8261c9d786bb24efcf90e0f1d33b45d541b425cde03fb6c43c6f2b2c7
                              • Instruction Fuzzy Hash: C5219C71800128BBDF216FA5DE49DAE7A79EF05324F14423EF524762E1CA794D418FA8
                              APIs
                              • lstrlenA.KERNEL32(symphonized: Installing,symphonized: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • wsprintfA.USER32 ref: 00404A27
                              • SetDlgItemTextA.USER32(?,symphonized: Installing), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$symphonized: Installing
                              • API String ID: 3540041739-853358426
                              • Opcode ID: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                              • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                              • Opcode Fuzzy Hash: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                              • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: e61c022a33ae2d8226f4f9d8dc9768096fb4d6cd4e5c598d89deb3e57b8d12c3
                              • Instruction ID: adaf369aa6dab84e94bee76403d526b7d43184adb12fe210256c1aedb67fe499
                              • Opcode Fuzzy Hash: e61c022a33ae2d8226f4f9d8dc9768096fb4d6cd4e5c598d89deb3e57b8d12c3
                              • Instruction Fuzzy Hash: 43512536D04159AEFB55DFB488A4AEEBBF6EF453C0F124169E841B315DCA306E4087D2
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: ffde7fea2c20ff78d34b9dd6ca395fc00db0322e175274b43119d545686d3dc4
                              • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                              • Opcode Fuzzy Hash: ffde7fea2c20ff78d34b9dd6ca395fc00db0322e175274b43119d545686d3dc4
                              • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405A37
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405A40
                              • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405A51
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A31
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-4083868402
                              • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction ID: 868260c831235620665dea70b18de3ff29fa680cd517475ab4f5cc36a8a73f00
                              • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction Fuzzy Hash: 79D023726015303AD1127F154C05DCF1A4C8F023507050077F200B7191CB3C0D514BFE
                              APIs
                              • CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75573410,?,75572EE0,00405881,?,75573410,75572EE0,00000000), ref: 00405AD8
                              • CharNextA.USER32(00000000), ref: 00405ADD
                              • CharNextA.USER32(00000000), ref: 00405AF1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID: C:\
                              • API String ID: 3213498283-3404278061
                              • Opcode ID: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                              • Instruction ID: db937687bc36527a3f7147c44c8c9b1a0bf4ed848bee0725310acd997699ac17
                              • Opcode Fuzzy Hash: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                              • Instruction Fuzzy Hash: D8F0C861B14F501AFB2262640C54B776BA8CB99350F04406BD540671C286BC6C404F6A
                              APIs
                              • CloseHandle.KERNEL32(000002A8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                              • CloseHandle.KERNEL32(000002C0,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004037FC
                              • C:\Users\user\AppData\Local\Temp\nsj6345.tmp, xrefs: 0040382D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsj6345.tmp
                              • API String ID: 2962429428-3198659446
                              • Opcode ID: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                              • Instruction ID: a243388e665e2d569925beaf0092b2dcbae65f1e85c6ca02b15765f08549dd2e
                              • Opcode Fuzzy Hash: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                              • Instruction Fuzzy Hash: 08E04F3250071896C620BF79AE494853B599B41735724C776F138B20F1C73899975AA9
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00405163
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                                • Part of subcall function 004041A6: SendMessageA.USER32(00010418,00000000,00000000,00000000), ref: 004041B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                              • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\aMfizaMilo.exe,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405A7E
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\aMfizaMilo.exe,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405A8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-1876063424
                              • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction ID: 40098e637bf6d505f922d12736ff559178fc12fa7d0ee67292c12de19d06dc46
                              • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction Fuzzy Hash: 6ED0A7729089702EF30393108C00B9F6A88CF16341F090062E480A7191C67C0C424BAD
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                              • GlobalFree.KERNEL32(00000000), ref: 100011B4
                              • GlobalFree.KERNEL32(?), ref: 100011C7
                              • GlobalFree.KERNEL32(?), ref: 100011F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3858045567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.3858028921.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858085012.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3858103036.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                              • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                              • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              Memory Dump Source
                              • Source File: 00000000.00000002.3851901735.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3851885421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851926427.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3851961760.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3852299727.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                              • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9
                              APIs
                              • SetErrorMode.KERNEL32 ref: 00403332
                              • GetVersion.KERNEL32 ref: 00403338
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033A7
                              • OleInitialize.OLE32(00000000), ref: 004033AE
                              • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033CA
                              • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033DF
                              • GetModuleHandleA.KERNEL32(00000000,0042A000,00000000,?,00000006,00000008,0000000A), ref: 004033F2
                              • CharNextA.USER32(00000000,0042A000,00000020,?,00000006,00000008,0000000A), ref: 0040341D
                              • GetTempPathA.KERNEL32(00000400,0042B400,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040351A
                              • GetWindowsDirectoryA.KERNEL32(0042B400,000003FB,?,00000006,00000008,0000000A), ref: 0040352B
                              • lstrcatA.KERNEL32(0042B400,\Temp,?,00000006,00000008,0000000A), ref: 00403537
                              • GetTempPathA.KERNEL32(000003FC,0042B400,0042B400,\Temp,?,00000006,00000008,0000000A), ref: 0040354B
                              • lstrcatA.KERNEL32(0042B400,Low,?,00000006,00000008,0000000A), ref: 00403553
                              • SetEnvironmentVariableA.KERNEL32(TEMP,0042B400,0042B400,Low,?,00000006,00000008,0000000A), ref: 00403564
                              • SetEnvironmentVariableA.KERNEL32(TMP,0042B400,?,00000006,00000008,0000000A), ref: 0040356C
                              • DeleteFileA.KERNEL32(0042B000,?,00000006,00000008,0000000A), ref: 00403580
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004038E9: lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75573410), ref: 004039D9
                                • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                                • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(004236C0), ref: 004039F7
                                • Part of subcall function 004038E9: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403A40
                                • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(FFFFFFFF,0042B400,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(FFFFFFFF,0042B400,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040362E
                              • ExitProcess.KERNEL32 ref: 0040364F
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040376C
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                              • ExitProcess.KERNEL32 ref: 004037F1
                                • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                              • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3704715180-3941163293
                              • Opcode ID: f873ef8a45b584c720bb88a4428bdce3541239ead945e93ac8a036a0ff26db3b
                              • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                              • Opcode Fuzzy Hash: f873ef8a45b584c720bb88a4428bdce3541239ead945e93ac8a036a0ff26db3b
                              • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                              • GetDlgItem.USER32(?,00000408), ref: 00404B60
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BAA
                              • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                              • SetWindowLongA.USER32(?,000000FC,00405134), ref: 00404BD6
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BEA
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C30
                              • DeleteObject.GDI32(00000000), ref: 00404C33
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404D6D
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D7B
                              • ShowWindow.USER32(?,00000005), ref: 00404D8C
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F03
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F27
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                              • ImageList_Destroy.COMCTL32(?), ref: 00404F5C
                              • GlobalFree.KERNEL32(?), ref: 00404F6C
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                              • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004050BD
                              • ShowWindow.USER32(?,00000000), ref: 0040510B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405116
                              • ShowWindow.USER32(00000000), ref: 0040511D
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: d8afd28a0c3ee7a5ecc07d83f55fb30fbace4eef79b80df0a3b445219cdd2625
                              • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                              • Opcode Fuzzy Hash: d8afd28a0c3ee7a5ecc07d83f55fb30fbace4eef79b80df0a3b445219cdd2625
                              • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                              APIs
                              • DeleteFileA.KERNEL32(?,?,75573410,75572EE0,00000000), ref: 0040588A
                              • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,75573410,75572EE0,00000000), ref: 004058D2
                              • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,75573410,75572EE0,00000000), ref: 004058F3
                              • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,75573410,75572EE0,00000000), ref: 004058F9
                              • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,75573410,75572EE0,00000000), ref: 0040590A
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                              • FindClose.KERNEL32(00000000), ref: 004059C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 2035342205-1173974218
                              • Opcode ID: 3ebdef7a8bfe5bb7036cc40bba984425dda0d6b7b6891e5c0f59388fd5a4de97
                              • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                              • Opcode Fuzzy Hash: 3ebdef7a8bfe5bb7036cc40bba984425dda0d6b7b6891e5c0f59388fd5a4de97
                              • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                              • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 0040535D
                              • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                              • GetClientRect.USER32(?,?), ref: 004053A9
                              • GetSystemMetrics.USER32(00000002), ref: 004053B0
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                              • ShowWindow.USER32(?,00000008), ref: 0040544C
                              • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                              • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                                • Part of subcall function 0040418F: SendMessageA.USER32(00000028,?,00000001,00403FBF), ref: 0040419D
                              • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                              • CreateThread.KERNEL32(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                              • CloseHandle.KERNEL32(00000000), ref: 004054D3
                              • ShowWindow.USER32(00000000), ref: 004054F6
                              • ShowWindow.USER32(?,00000008), ref: 004054FD
                              • ShowWindow.USER32(00000008), ref: 00405543
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                              • CreatePopupMenu.USER32 ref: 00405588
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 0040559D
                              • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055D6
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                              • OpenClipboard.USER32(00000000), ref: 00405622
                              • EmptyClipboard.USER32 ref: 00405628
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                              • GlobalLock.KERNEL32(00000000), ref: 0040563B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                              • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                              • SetClipboardData.USER32(00000001,00000000), ref: 00405673
                              • CloseClipboard.USER32 ref: 00405679
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: 0B
                              • API String ID: 590372296-4132856435
                              • Opcode ID: 3f3f8157529fe7dfee1cc0433fd35ac1c8f506144681312bbf4a5472d80bc8bd
                              • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                              • Opcode Fuzzy Hash: 3f3f8157529fe7dfee1cc0433fd35ac1c8f506144681312bbf4a5472d80bc8bd
                              • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                              • ShowWindow.USER32(?), ref: 00403CDF
                              • DestroyWindow.USER32 ref: 00403CF3
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                              • GetDlgItem.USER32(?,?), ref: 00403D30
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                              • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                              • GetDlgItem.USER32(?,00000001), ref: 00403DF9
                              • GetDlgItem.USER32(?,00000002), ref: 00403E03
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E6E
                              • GetDlgItem.USER32(?,00000003), ref: 00403F14
                              • ShowWindow.USER32(00000000,?), ref: 00403F35
                              • EnableWindow.USER32(?,?), ref: 00403F47
                              • EnableWindow.USER32(?,?), ref: 00403F62
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F78
                              • EnableMenuItem.USER32(00000000), ref: 00403F7F
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F97
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                              • lstrlenA.KERNEL32(00420D30,?,00420D30,00000000), ref: 00403FD4
                              • SetWindowTextA.USER32(?,00420D30), ref: 00403FE3
                              • ShowWindow.USER32(?,0000000A), ref: 00404117
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID: 0B
                              • API String ID: 184305955-4132856435
                              • Opcode ID: 494e5d15f52d909de3728dffe2acfde06eca01d490e6fb77ff0f3207f2f85486
                              • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                              • Opcode Fuzzy Hash: 494e5d15f52d909de3728dffe2acfde06eca01d490e6fb77ff0f3207f2f85486
                              • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D
                              APIs
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • lstrcatA.KERNEL32(0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75573410,0042B400,0042A000,00000000), ref: 00403964
                              • lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75573410), ref: 004039D9
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • GetFileAttributesA.KERNEL32(004236C0), ref: 004039F7
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403A40
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A95
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                              • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                              • RegisterClassA.USER32(00423EC0), ref: 00403B42
                              • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$0B$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-610843794
                              • Opcode ID: c0b74264b80d684e05b9670c33d338dc849c687744dfa108ed2df9d331500c62
                              • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                              • Opcode Fuzzy Hash: c0b74264b80d684e05b9670c33d338dc849c687744dfa108ed2df9d331500c62
                              • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040432E
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404360
                              • GetSysColor.USER32(?), ref: 00404371
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                              • lstrlenA.KERNEL32(?), ref: 00404392
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                              • GetDlgItem.USER32(?,0000040A), ref: 00404418
                              • SendMessageA.USER32(00000000), ref: 0040441B
                              • GetDlgItem.USER32(?,000003E8), ref: 00404446
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                              • SetCursor.USER32(00000000), ref: 0040449E
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                              • SetCursor.USER32(00000000), ref: 004044B7
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004044E3
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004044F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: N$nB@
                              • API String ID: 3103080414-4167803745
                              • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                              • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                              • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                              • SetWindowTextA.USER32(00000000,?), ref: 00404643
                              • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                              • lstrcmpiA.KERNEL32(004236C0,00420D30), ref: 00404731
                              • lstrcatA.KERNEL32(?,004236C0), ref: 0040473D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                                • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                                • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,0042A000,75573410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                                • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                                • Part of subcall function 00406303: CharNextA.USER32(?,0042A000,75573410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                                • Part of subcall function 00406303: CharPrevA.USER32(?,?,75573410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 0040480D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                                • Part of subcall function 00404981: lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                                • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                                • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: 0B$A
                              • API String ID: 2624150263-373579336
                              • Opcode ID: dabeba3b97e2907f87f04c2d0dd353413e682be42e818b22754e0aedb349eabf
                              • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                              • Opcode Fuzzy Hash: dabeba3b97e2907f87f04c2d0dd353413e682be42e818b22754e0aedb349eabf
                              • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                              • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                              • wsprintfA.USER32 ref: 00405D7D
                              • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DB8
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DC7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                              • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                              • GlobalFree.KERNEL32(00000000), ref: 00405E66
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNEL32(00000003,00402DDB,0042BC00,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: c723dcda6b53f61ccdafe327344b31b2963e039a378ed67f4dc0120c4ff23498
                              • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                              • Opcode Fuzzy Hash: c723dcda6b53f61ccdafe327344b31b2963e039a378ed67f4dc0120c4ff23498
                              • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402DAC
                              • GetModuleFileNameA.KERNEL32(00000000,0042BC00,00000400), ref: 00402DC8
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNEL32(00000003,00402DDB,0042BC00,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,0042AC00,0042AC00,0042BC00,0042BC00,80000000,00000003), ref: 00402E11
                              • GlobalAlloc.KERNEL32(00000040,0040A130), ref: 00402F58
                              Strings
                              • Error launching installer, xrefs: 00402DE8
                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FA1
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FEF
                              • soft, xrefs: 00402E88
                              • Inst, xrefs: 00402E7F
                              • Null, xrefs: 00402E91
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-3016655952
                              • Opcode ID: 186828efae30a8a2c236a5659a586d8060acad418c34dac636486169236efce2
                              • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                              • Opcode Fuzzy Hash: 186828efae30a8a2c236a5659a586d8060acad418c34dac636486169236efce2
                              • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C
                              APIs
                              • GetSystemDirectoryA.KERNEL32(004236C0,00000400), ref: 004061E6
                              • GetWindowsDirectoryA.KERNEL32(004236C0,00000400,?,00420510,00000000,004051F8,00420510,00000000), ref: 004061F9
                              • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,00420510,00000000,004051F8,00420510,00000000), ref: 00406235
                              • SHGetPathFromIDListA.SHELL32(00000000,004236C0), ref: 00406243
                              • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                              • lstrcatA.KERNEL32(004236C0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                              • lstrlenA.KERNEL32(004236C0,?,00420510,00000000,004051F8,00420510,00000000,00000000,00000000,00000000), ref: 004062C5
                              Strings
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040626D
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 004061B5
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-730719616
                              • Opcode ID: 84b556ce97db38d950ada7426c365b30dcfc03bcdc7c69a4d791f1b42b63748e
                              • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                              • Opcode Fuzzy Hash: 84b556ce97db38d950ada7426c365b30dcfc03bcdc7c69a4d791f1b42b63748e
                              • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                              • GetSysColor.USER32(00000000), ref: 004041FA
                              • SetTextColor.GDI32(?,00000000), ref: 00404206
                              • SetBkMode.GDI32(?,?), ref: 00404212
                              • GetSysColor.USER32(?), ref: 00404225
                              • SetBkColor.GDI32(?,?), ref: 00404235
                              • DeleteObject.GDI32(?), ref: 0040424F
                              • CreateBrushIndirect.GDI32(?), ref: 00404259
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                              • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                              APIs
                              • lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                              • SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                              • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                              • Opcode Fuzzy Hash: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                              • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8
                              APIs
                              • DestroyWindow.USER32(?,00000000), ref: 00402D11
                              • GetTickCount.KERNEL32 ref: 00402D2F
                              • wsprintfA.USER32 ref: 00402D5D
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                                • Part of subcall function 00402CDD: MulDiv.KERNEL32(?,00000064,?), ref: 00402CF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                              • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                              • Opcode Fuzzy Hash: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                              • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                              • GetMessagePos.USER32 ref: 00404AAE
                              • ScreenToClient.USER32(?,?), ref: 00404AC8
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                              • wsprintfA.USER32 ref: 00402CB0
                              • SetWindowTextA.USER32(?,?), ref: 00402CC0
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                              • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                              • wsprintfA.USER32 ref: 00406413
                              • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 00406427
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                              • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                              • GlobalFree.KERNEL32(?), ref: 004027E5
                              • GlobalFree.KERNEL32(00000000), ref: 004027F8
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: dcacf9be938e6bab2b24fd9971acd25967e82a84bb27c597e485d254bc79bccb
                              • Instruction ID: 2027d9f4b10c536beff5d97c30926d1382b99fb2686dd4663458e7dd77d5dad7
                              • Opcode Fuzzy Hash: dcacf9be938e6bab2b24fd9971acd25967e82a84bb27c597e485d254bc79bccb
                              • Instruction Fuzzy Hash: C5219C71800128BBDF216FA5DE49DAE7A79EF05324F14423EF524762E1CA794D418FA8
                              APIs
                              • lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • wsprintfA.USER32 ref: 00404A27
                              • SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$0B
                              • API String ID: 3540041739-2032437577
                              • Opcode ID: b23186d452688b2e8875940d2b1567af98af2718b135d1178c3f368161fe70b0
                              • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                              • Opcode Fuzzy Hash: b23186d452688b2e8875940d2b1567af98af2718b135d1178c3f368161fe70b0
                              • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,0042A000,75573410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                              • CharNextA.USER32(?,0042A000,75573410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                              • CharPrevA.USER32(?,?,75573410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                              • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,0040A400,0040A400,00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: dc8ff8f613ccaf3a1bdddd658223a71cf5c03a6f10e6b809243d1d3cf6c4a793
                              • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                              • Opcode Fuzzy Hash: dc8ff8f613ccaf3a1bdddd658223a71cf5c03a6f10e6b809243d1d3cf6c4a793
                              • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 74ac6799808a35a38ef0222afa5692bf00b997bfa79daeac73048440a50110dd
                              • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                              • Opcode Fuzzy Hash: 74ac6799808a35a38ef0222afa5692bf00b997bfa79daeac73048440a50110dd
                              • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: ad1215dfc819b2c5c4de7a1a53f68875bc6cfa7ccac298a48e27e0db3473e380
                              • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                              • Opcode Fuzzy Hash: ad1215dfc819b2c5c4de7a1a53f68875bc6cfa7ccac298a48e27e0db3473e380
                              • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                              • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00402028
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402038
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B2
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 3b5be73adf85405213ea04b1693982704ad386d22b40f5588508e7c9aa8f58d6
                              • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                              • Opcode Fuzzy Hash: 3b5be73adf85405213ea04b1693982704ad386d22b40f5588508e7c9aa8f58d6
                              • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                              • RegCloseKey.ADVAPI32(?), ref: 00402C22
                              • RegCloseKey.ADVAPI32(?), ref: 00402C43
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 03e0a49003aaeb5a403670c18ff433aeaee3fdf9291277d8cb25cd743ef3ba95
                              • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                              • Opcode Fuzzy Hash: 03e0a49003aaeb5a403670c18ff433aeaee3fdf9291277d8cb25cd743ef3ba95
                              • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                              APIs
                              • CreateDirectoryA.KERNEL32(?,?,0042B400), ref: 004056C9
                              • GetLastError.KERNEL32 ref: 004056DD
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                              • GetLastError.KERNEL32 ref: 004056FC
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID:
                              • API String ID: 3449924974-0
                              • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                              • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9
                              APIs
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,00422138,?,00405B36,00422138,00422138,75573410,?,75572EE0,00405881,?,75573410,75572EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • lstrlenA.KERNEL32(00422138,00000000,00422138,00422138,75573410,?,75572EE0,00405881,?,75573410,75572EE0,00000000), ref: 00405B72
                              • GetFileAttributesA.KERNEL32(00422138,00422138,00422138,00422138,00422138,00422138,00000000,00422138,00422138,75573410,?,75572EE0,00405881,?,75573410,75572EE0), ref: 00405B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: 8!B
                              • API String ID: 3248276644-3245627493
                              • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                              • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00405163
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                                • Part of subcall function 004041A6: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 004041B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                              • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405C75
                              • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405C8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                              • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                              • CloseHandle.KERNEL32(?), ref: 0040576E
                              Strings
                              • Error launching installer, xrefs: 0040574B
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                              • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                              • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                              • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                              • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                              • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                              • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                              • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                              • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                              • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              Memory Dump Source
                              • Source File: 00000006.00000002.3851902858.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3851886765.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851928136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851961894.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3851997080.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_aMfizaMilo.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                              • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9