Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aMfizaMilo.exe

Overview

General Information

Sample name:aMfizaMilo.exe
Analysis ID:1466841
MD5:95dc64015aa43a27412f7ff0979c5b87
SHA1:bde0ae97f4f98c0dd8a0833702ff073befbec268
SHA256:a7d2ea641dbc8e50000e6b42c9cca200fa25d5e37ddd1857eb489795ab5564ee
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Switches to a custom stack to bypass stack traces
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • aMfizaMilo.exe (PID: 9032 cmdline: "C:\Users\user\Desktop\aMfizaMilo.exe" MD5: 95DC64015AA43A27412F7FF0979C5B87)
    • aMfizaMilo.exe (PID: 1028 cmdline: "C:\Users\user\Desktop\aMfizaMilo.exe" MD5: 95DC64015AA43A27412F7FF0979C5B87)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.6233337868.00000000021F6000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.1921801552.00000000059D6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: aMfizaMilo.exe PID: 9032JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\aMfizaMilo.exe, ProcessId: 9032, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers\keelhauls.scr
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\aMfizaMilo.exe, ProcessId: 9032, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers\keelhauls.scr
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://109.248.151.29/XAwAOIp212.binAvira URL Cloud: Label: malware
        Source: http://109.248.151.29/XAwAOIp212.bin;Avira URL Cloud: Label: malware
        Source: aMfizaMilo.exeReversingLabs: Detection: 57%
        Source: aMfizaMilo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: aMfizaMilo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_004026F8 FindFirstFileA,3_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_0040639C FindFirstFileA,FindClose,3_2_0040639C
        Source: global trafficTCP traffic: 192.168.11.20:49738 -> 109.248.151.29:80
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
        Source: aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042FC000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243739483.0000000005EF0000.00000004.00001000.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042F0000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin._
        Source: aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin109.24
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin17feb02d20a315ce0LMEM
        Source: aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin6
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin8
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin9.24
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin;
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binA
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binHG
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binI
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binL
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binN
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binS
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin_
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin_G
        Source: aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binche-Co
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bine-Co
        Source: aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binem32
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binf
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binj_
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binp
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binr_
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.binx_
        Source: aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/XAwAOIp212.bin~_
        Source: aMfizaMilo.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: aMfizaMilo.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_004052FE
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Windows\resources\0409Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004067250_2_00406725
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00404B3D0_2_00404B3D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_004067253_2_00406725
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_00404B3D3_2_00404B3D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: String function: 00402AC1 appears 48 times
        Source: aMfizaMilo.exe, 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestrabismical.exe0 vs aMfizaMilo.exe
        Source: aMfizaMilo.exe, 00000003.00000000.1261114839.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestrabismical.exe0 vs aMfizaMilo.exe
        Source: aMfizaMilo.exeBinary or memory string: OriginalFilenamestrabismical.exe0 vs aMfizaMilo.exe
        Source: aMfizaMilo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal76.troj.evad.winEXE@3/12@0/1
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040330D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004045CA
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004020CB LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_004020CB
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenesJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Users\user\AppData\Local\Temp\nsu5B6.tmpJump to behavior
        Source: aMfizaMilo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: aMfizaMilo.exeReversingLabs: Detection: 57%
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile read: C:\Users\user\Desktop\aMfizaMilo.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: aMfizaMilo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: aMfizaMilo.exe PID: 9032, type: MEMORYSTR
        Source: Yara matchFile source: 00000003.00000002.6233337868.00000000021F6000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1921801552.00000000059D6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
        Source: C:\Users\user\Desktop\aMfizaMilo.exeFile created: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI/Special instruction interceptor: Address: 612B9B6
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI/Special instruction interceptor: Address: 294B9B6
        Source: C:\Users\user\Desktop\aMfizaMilo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\aMfizaMilo.exe TID: 8152Thread sleep time: -300000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\aMfizaMilo.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_00405861
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_004026F8 FindFirstFileA,3_2_004026F8
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 3_2_0040639C FindFirstFileA,FindClose,3_2_0040639C
        Source: aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004316000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000003.1751002983.00000000042CE000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000003.1751418072.00000000042F0000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042F0000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004316000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI call chain: ExitProcess graph end nodegraph_0-4286
        Source: C:\Users\user\Desktop\aMfizaMilo.exeAPI call chain: ExitProcess graph end nodegraph_0-4475
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_00403146 GetTickCount,SetFilePointer,SetFilePointer,LdrInitializeThunk,0_2_00403146
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
        Source: C:\Users\user\Desktop\aMfizaMilo.exeProcess created: C:\Users\user\Desktop\aMfizaMilo.exe "C:\Users\user\Desktop\aMfizaMilo.exe"Jump to behavior
        Source: C:\Users\user\Desktop\aMfizaMilo.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040330D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        11
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
        Process Injection
        1
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Clipboard Data
        Junk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Process Injection
        NTDS13
        System Information Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
        Obfuscated Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        aMfizaMilo.exe58%ReversingLabsWin32.Trojan.GuLoader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin100%Avira URL Cloudmalware
        http://109.248.151.29/XAwAOIp212.binr_0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin_0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binx_0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin109.240%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binp0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin~_0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binS0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binf0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binA0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin_G0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bine-Co0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin80%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin60%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binHG0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin;100%Avira URL Cloudmalware
        http://109.248.151.29/0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin17feb02d20a315ce0LMEM0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binN0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binche-Co0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binj_0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binL0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binI0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin._0%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.binem320%Avira URL Cloudsafe
        http://109.248.151.29/XAwAOIp212.bin9.240%Avira URL Cloudsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://109.248.151.29/XAwAOIp212.binaMfizaMilo.exe, 00000003.00000002.6243119735.00000000042FC000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243739483.0000000005EF0000.00000004.00001000.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042F0000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://109.248.151.29/XAwAOIp212.bin_aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binx_aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binr_aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin~_aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binSaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binpaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin109.24aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErroraMfizaMilo.exefalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binfaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin_GaMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bine-CoaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binAaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin;aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://nsis.sf.net/NSIS_ErroraMfizaMilo.exefalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin6aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmp, aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin8aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binHGaMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin17feb02d20a315ce0LMEMaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binNaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binche-CoaMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binLaMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin._aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.bin9.24aMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binIaMfizaMilo.exe, 00000003.00000002.6243119735.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binj_aMfizaMilo.exe, 00000003.00000002.6243119735.00000000042A8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://109.248.151.29/XAwAOIp212.binem32aMfizaMilo.exe, 00000003.00000003.1751002983.0000000004305000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        109.248.151.29
        unknownRussian Federation
        52048DATACLUBLVfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1466841
        Start date and time:2024-07-03 14:15:00 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 14m 41s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Run name:Suspected Instruction Hammering
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:aMfizaMilo.exe
        Detection:MAL
        Classification:mal76.troj.evad.winEXE@3/12@0/1
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 84%
        • Number of executed functions: 61
        • Number of non-executed functions: 66
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, UserOOBEBroker.exe, WMIADAP.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com
        • Execution Graph export aborted for target aMfizaMilo.exe, PID 1028 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: aMfizaMilo.exe
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        109.248.151.29DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
        • 109.248.151.29/MnBzHGsyHle133.bin
        Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
        • 109.248.151.29/DttVKmqMztLpGMCsim17.bin
        Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
        • 109.248.151.29/RjdSJnnj92.bin
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        DATACLUBLVCertificate_of_registration.exeGet hashmaliciousRemcosBrowse
        • 109.248.151.250
        DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
        • 109.248.151.29
        Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
        • 109.248.151.29
        Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
        • 109.248.151.29
        rUniversidadedeBras#U00edlia-ProjetoFMD20240342.vbsGet hashmaliciousUnknownBrowse
        • 109.248.151.238
        17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
        • 109.248.151.231
        8x121Y7FNW.jsGet hashmaliciousAveMaria, PrivateLoaderBrowse
        • 109.248.151.231
        Product Specifications_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
        • 109.248.151.238
        RCBC Plaza Project Quotation.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
        • 109.248.151.238
        ELMA _CO LLC_pdf.vbsGet hashmaliciousFormBook, GuLoaderBrowse
        • 109.248.151.238
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll1ppvR5VRT6.exeGet hashmaliciousGuLoaderBrowse
          Ozb8aojWew.exeGet hashmaliciousGuLoaderBrowse
            1ppvR5VRT6.exeGet hashmaliciousGuLoaderBrowse
              Ozb8aojWew.exeGet hashmaliciousGuLoaderBrowse
                Documents.com.exeGet hashmaliciousGuLoaderBrowse
                  Documents.com.exeGet hashmaliciousGuLoaderBrowse
                    27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
                      27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
                        Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):836396
                          Entropy (8bit):0.29759115823756915
                          Encrypted:false
                          SSDEEP:768:ONjfRwbxYsn1KxrM/MRos6Yumut+ud9j4f7lzZnMkviwCdR/S9krIXLtZkCoVf/1:Q/5y
                          MD5:6593DE223564535CE11D13BFB74348CA
                          SHA1:5D85AF6A3877470118DDAC318A131C7EB2498BB2
                          SHA-256:A57CB464F48B61E87ED20832F2D6EAE93C2669BB13850CB6186248E9B597364C
                          SHA-512:F0B85A3F75268CB4B08FF7FC18A631ACC4C1D9E8ACA804B9ED8DFC186789BF930467F1C2AE2DCC769AC200557D4FF01ABDA80EA17CE622488D56C264D2941E3F
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:..................................................................................................................................?......................................................................................................................................................................................................................................................................................................................................................................................................................................e.......................................................................................................................................................................................................k...................................................S.......................................................................................................................X..........................................................................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):21145
                          Entropy (8bit):4.497344434521278
                          Encrypted:false
                          SSDEEP:384:lUOZNanrJF8+6XhYz5zYHsP9R/wWb1ml2EM:JiT8+MadPEWJOc
                          MD5:B326CB8D03A7AF828A6347ADDCB5A9D1
                          SHA1:1F7F57AA5763B004D3198597EB80208AA0E93570
                          SHA-256:A9CD23EB35C039440BDE74A206AC3613B52FD667AA1484125587E61C79912DFC
                          SHA-512:57999DE9A99336DB3A7B9AFF3C69295BDA2514374187E0B0C0082F21B68101530B17A0D5A23157584303C505F82C3D441360B91649A39EC2A20CA6D890E8D126
                          Malicious:false
                          Reputation:low
                          Preview:...........___.................}.a.LL.._........5..MM.........A.................rrrrrrrr.]]....k...e...r...n...e...l...3...2...:...:...C...r...e...a...t...e...F...i.\.l..%e...A.bb(...m... ..,r...4.OO ...,... ..Bi... ...0...x...8.J.0...0..C0.z.0...0...0...0...,... ...i... ...0.h.,... ...p... ...0...,... ...i... ...4...,... ...i... ...0...x..A8...0...,... ...i... ...0..Z)...i.......r..a8...q...k...e...r...n...e...l...3...2.. :...:...S..7e...t...F..ii.Z.l..de...P...o...i...n.b.t...e..=r...(...i... .UUr...8...,... ...i... ...2...3...0...1...2... ..$,... ..8i... ...0...,...i.=. .."0...)...i.......r...4...q...k...e...r.'.n..%e...l...3...2...:...:..zV.JJi...r...t...u...a...l...A...l...l...o...c..O(...i... ...0...,...i... ...4...3...6...7.**5.((6...4...8...,... .11i... ...0.11x..k3...0...0.c.0...,... ...i... ...0...x..{4...0...)...p.......r.@.2...q...k...e...r...n..Xe...l...3..X2...:.o.:...R...e...a...d...F...i...l...e...(...i... .S.r...8...,... ...i... ...r...2...,.1. .%.i... ...4...3...6...7
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1089926
                          Entropy (8bit):0.29789121998864304
                          Encrypted:false
                          SSDEEP:768:DfIbQMnX/cgMWndUtQ//KuGQ+4xRoQoezjVn20Ka17J6T0vbXHtPSeySgSJSejnK:VIbm
                          MD5:7978BF27082616FAADE55B22394BBDDC
                          SHA1:3CB41F03B1CD775F7F6BC9B95944854DDA87BF36
                          SHA-256:B88A13EB0EEDB9BE6E1F809D0B8A55979186DB208858FEDCE5A59B28556B248B
                          SHA-512:9A734B8285C96706C434AEDF2ABF6666E82EC257DEFAB74213C50B18A5C7B23B3A48D76FE64E4CC6446CC460095CEA3F37D8029FA28B9198F4A371BA1C23922B
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:............................................................................................................................................................................................................................................................................................................................................O................................................................................................................../.....................................................................................M............................................................................................................................................................................................................................................................................................................0.....................................................................................................................................................................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1078378
                          Entropy (8bit):0.29937849286877016
                          Encrypted:false
                          SSDEEP:768:N9lotXK6U6HA/zmsIxzvraRwfj+iMbmwrhg2hnwjYBm2GOP9bsWZafCJL6Ir7wxG:QRPMLzJ
                          MD5:87A3CE82A211E6022D7145C99EEF5EDC
                          SHA1:D2AA5DAEF3272ACDEE40657353EBB0BA94728E8D
                          SHA-256:66BF6C84307739696EB18D632B6A34755375E61F3C612DC273C7F8F25FCAD938
                          SHA-512:66F2BC1530F6D187749486C7305F069D67964EF5427A6A59F2DC081469F5D608C6E0D2C30EDEF70A6A79E6386BE1528AE2B8725BA704E2D3CF8B2F303D8EB1CF
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:..................................................................................{.................................................................................................................................................................v...................................................................................................................................................<..................................................................................................................................................................................................s...............................................................................................................................................................................Y.......................................................................h..........................E..........................................................f..............................................................................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):442
                          Entropy (8bit):4.257547597458778
                          Encrypted:false
                          SSDEEP:12:cITDesyfMA34EmHSFoYHGzqDcnuV/HGgPF7Rl6s:LoMhcozqDV/HzPF+s
                          MD5:87308607BBEFDD32639F5BCAD963B8C2
                          SHA1:14A3196B8301243120BD7F9248C5949D718B4DEA
                          SHA-256:A71BD44CA8EFDA96BA1083D1D36FC2148592CA881CFF674C71B7742A1866B012
                          SHA-512:9019036C6976F9A8BA0F6D5FDE538FFA69C537A320CF09758E2CEB9012F4C106E4D09B15248CA0A695DC7960FFBBF500FF21BD3A17EBD37FE3DE13A0BBC8EA5E
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:douceurs aflggere dryfarmer telefonvagts barytosulphate unovertaken ligustres snydeblusens foersteaarsstuderende konserverendes..foresleeve tricks datastyret diadermic.statsforfatningsretten drfljenes lavritz resurged isodrosotherm redocked ekkoer.dvblind prstevikariaternes infeminine lvs dannebrogsordenens,atocia gummaking paaligningernes visard longueurs overklasselg afviste..gydningen svovlsures pillmaking treasonous jibhead sphygmoid,
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1196385
                          Entropy (8bit):0.29404357461455993
                          Encrypted:false
                          SSDEEP:768:zrTEDgAwUGxcEEBSF2XVHcg/62u6BEqlktC9le+FplzUtaPQVPKtoQFrqFrepOde:TM2gnM9
                          MD5:11825DAB7ECEA24188448D6DE7D605A5
                          SHA1:90CC6EEC53823CDB2E1946583042699B42C84BFF
                          SHA-256:E9F3CA77C307A76C115171B367B540D2615F30636A16EE986C852AEF5EAB6409
                          SHA-512:6F0F808DE0DADD0F8E94DF72E1A85828F0BD8E14FB8F4300614901A17C260AF55CFE33EC473FEF34663E8B069BF19306EB32D38E39E60149BD85D83D14C23749
                          Malicious:false
                          Preview:.................................g...............................................................................................................................................................................................w..................................................................................0..........................................................................................................................................................................n......................................................?....................................................................................................................................................................................................................................................................................................................................................................................................................................................|..........._................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):714538
                          Entropy (8bit):0.297157822096001
                          Encrypted:false
                          SSDEEP:768:eLtWEAnNzz6fiBH4r4D2EBct2GaDNHpDe9SM1hon+wFniYgoZhgBy9:Q
                          MD5:17DF408E712C3359E4B58F95E4529F16
                          SHA1:75203C6B467A1174B41DFEFE3795A9B87331808E
                          SHA-256:35D50D71AFA6B8169123458A8232CDE1E3D96E3A0E6734045714192B0930D1AA
                          SHA-512:7FA7600651CE103DD3F5143036E5EE6B5B3262555D331761BD426898990A6B314E25A018E4B16B395E86E0A023B24DF3796744860E6478EFBFA190EBADBC4253
                          Malicious:false
                          Preview:..............................................................................................!.............................................................................................................................................................................................................................;.............................................................................................................................................................................................................0............................................................................Q.....................................................................................................................................................................e................................................................................................................................................................................e.........................................................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):279429
                          Entropy (8bit):7.440589404691988
                          Encrypted:false
                          SSDEEP:6144:EBIUbXTygOPJfDSn/ixkc0Ll9yCnYV8bws3fy4B:XkXOZxbakkc0Ll9QsY4B
                          MD5:F8863D882553A6EFB3CB6111E7B13E3B
                          SHA1:C1079473474483560740FD299E53E9D4F7394B2E
                          SHA-256:7E7CD7AE34B03CE558793E91FAEBA688E1D6BFD8753FAFF3D60F0BFDCAFB4E75
                          SHA-512:8D4951D30E3774E638CB93D24AD40B0FB738F08939CF30F1D60626277C90F5318F9FA2C5B322BE12DBFBB8E7CB869D03D01138A112EBB1C041D3E533A10E1B32
                          Malicious:false
                          Preview:...+......:.....666.QQ.........u.........)........................8............ffffff.&&.......``...88...iiii......888............G............................................$$......\.......ww..................1..JJ...........""...........K.......................................ccc..............[[...........................kk........j......9.....hh...........J..........N.iii...........0000......{{.<.........5..........W...........R...!!..............................".5.......<<<<............................................1..........-..........o.,,,,,,...\.......&&...NN..........~.U........)))))))))...xx.....yy...................7..J.....;........e........,,,............................1........................D.....R.....................ww.......`.....ff.6......u....................]].......666...............BB..S.m........Y...?......GG.................>>>...........gg..m.2.........................IIII.......[[..............................."................b.::. ........H.....~~...T
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):49
                          Entropy (8bit):4.75216571132969
                          Encrypted:false
                          SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                          MD5:797DA95245047A54F125FBF3B19FA295
                          SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                          SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                          SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                          Malicious:false
                          Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):5238870
                          Entropy (8bit):0.9277389025480162
                          Encrypted:false
                          SSDEEP:6144:4gBIUbXTygOPJfDSn/ixkc0Ll9yCnYV8bws3fy4f0UEgjq3u:CkXOZxbakkc0Ll9QsY4nU3u
                          MD5:657AD2F273D0DB7DEF109D6E619F636A
                          SHA1:0CBB1516021BA9F766AC91A4491DC90488320630
                          SHA-256:5E46088DC84000ADF1C2E81841FCE77430A3D87482D51CAE08DC08C1BDD19B74
                          SHA-512:9691F6188FA7D10AAB4282B434D6F6F87EFAA4487D27367481C180B318CF0922E9F28B227375D983CA204689105D547ADB8200EBD14770E61B24A83EA9C23166
                          Malicious:false
                          Preview:.*......,................................)......x*..........................................................................................................................................................................................................................................J...f...............j...........................................................................................................................................;...#.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):11264
                          Entropy (8bit):5.76781505116372
                          Encrypted:false
                          SSDEEP:192:MPtkumJX7zBE2kGwfy9S9VkPsFQ1Mx1c:97O2k5q9wA1Mxa
                          MD5:55A26D7800446F1373056064C64C3CE8
                          SHA1:80256857E9A0A9C8897923B717F3435295A76002
                          SHA-256:904FD5481D72F4E03B01A455F848DEDD095D0FB17E33608E0D849F5196FB6FF8
                          SHA-512:04B8AB7A85C26F188C0A06F524488D6F2AC2884BF107C860C82E94AE12C3859F825133D78338FD2B594DFC48F7DC9888AE76FEE786C6252A5C77C88755128A5B
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          Joe Sandbox View:
                          • Filename: 1ppvR5VRT6.exe, Detection: malicious, Browse
                          • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                          • Filename: 1ppvR5VRT6.exe, Detection: malicious, Browse
                          • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                          • Filename: Documents.com.exe, Detection: malicious, Browse
                          • Filename: Documents.com.exe, Detection: malicious, Browse
                          • Filename: 27062024-322copy.exe, Detection: malicious, Browse
                          • Filename: 27062024-322copy.exe, Detection: malicious, Browse
                          • Filename: Jailkeeper.bat.exe, Detection: malicious, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L...R..Y...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..^....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\aMfizaMilo.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):25
                          Entropy (8bit):4.163856189774724
                          Encrypted:false
                          SSDEEP:3:+gMn:8
                          MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                          SHA1:61DC848DD725DB72746E332D040A032C726C9816
                          SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                          SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                          Malicious:false
                          Preview:[Caps]..Setting=Enabled..
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):7.2599762726726125
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:aMfizaMilo.exe
                          File size:891'654 bytes
                          MD5:95dc64015aa43a27412f7ff0979c5b87
                          SHA1:bde0ae97f4f98c0dd8a0833702ff073befbec268
                          SHA256:a7d2ea641dbc8e50000e6b42c9cca200fa25d5e37ddd1857eb489795ab5564ee
                          SHA512:450a8ba7eb3c3178b5567b692d55518d393af5d971bb22ab13e1c9078c9ea389f1a9e28d391a8882ef8d1b99972ec27af64fa2c7aa8fa79c9c0d2423d0176d10
                          SSDEEP:12288:XcIjd3nQIQsk3na+QiLPTEYLwdLh5d2tqnXQJgcCp8vGiVIkk84n5QWrV:XcIjUna3iLtwb/2tWXMi2rq7nHB
                          TLSH:FA15F1BF236B981EC49065B609F1D108A6F04E4E15BD8A476A72FFA8FE7C7C07C89151
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...s..Y.................b.........
                          Icon Hash:070f4b69d5300d13
                          Entrypoint:0x40330d
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x597FCC73 [Tue Aug 1 00:33:55 2017 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:57e98d9a5a72c8d7ad8fb7a6a58b3daf
                          Instruction
                          sub esp, 00000184h
                          push ebx
                          push esi
                          push edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [esp+18h], ebx
                          mov dword ptr [esp+10h], 0040A130h
                          mov dword ptr [esp+20h], ebx
                          mov byte ptr [esp+14h], 00000020h
                          call dword ptr [004080A8h]
                          call dword ptr [004080A4h]
                          and eax, BFFFFFFFh
                          cmp ax, 00000006h
                          mov dword ptr [0042472Ch], eax
                          je 00007FA500BB6B43h
                          push ebx
                          call 00007FA500BB9C12h
                          cmp eax, ebx
                          je 00007FA500BB6B39h
                          push 00000C00h
                          call eax
                          mov esi, 00408298h
                          push esi
                          call 00007FA500BB9B8Eh
                          push esi
                          call dword ptr [004080A0h]
                          lea esi, dword ptr [esi+eax+01h]
                          cmp byte ptr [esi], bl
                          jne 00007FA500BB6B1Dh
                          push 0000000Ah
                          call 00007FA500BB9BE6h
                          push 00000008h
                          call 00007FA500BB9BDFh
                          push 00000006h
                          mov dword ptr [00424724h], eax
                          call 00007FA500BB9BD3h
                          cmp eax, ebx
                          je 00007FA500BB6B41h
                          push 0000001Eh
                          call eax
                          test eax, eax
                          je 00007FA500BB6B39h
                          or byte ptr [0042472Fh], 00000040h
                          push ebp
                          call dword ptr [00408044h]
                          push ebx
                          call dword ptr [00408288h]
                          mov dword ptr [004247F8h], eax
                          push ebx
                          lea eax, dword ptr [esp+38h]
                          push 00000160h
                          push eax
                          push ebx
                          push 0041FCF0h
                          call dword ptr [00408178h]
                          push 0040A1ECh
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000x5aa38.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x603c0x6200029c8031e2fb36630bb7ccb6d1d379b5False0.6572464923469388data6.39361655287636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x12480x1400421f9404c16c75fa4bc7d37da19b3076False0.4287109375data5.044261339836676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x1a8380x400c93d53142ea782e156ddc6acebdf883dFalse0.6455078125data5.223134318413766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x250000x1c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x410000x5aa380x5ac0036138a89abeb35667330457e2be0a675False0.3329620781680441data5.566457386793811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x414780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.21799641980057402
                          RT_ICON0x834a00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.6193806932450018
                          RT_ICON0x93cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.6783195020746888
                          RT_ICON0x962700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.7033302063789869
                          RT_ICON0x973180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.7731876332622601
                          RT_ICON0x981c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.7274590163934426
                          RT_ICON0x98b480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.8285198555956679
                          RT_ICON0x993f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishUnited States0.8323732718894009
                          RT_ICON0x99ab80x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.5115853658536585
                          RT_ICON0x9a1200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6777456647398844
                          RT_ICON0x9a6880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.7854609929078015
                          RT_ICON0x9aaf00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.553763440860215
                          RT_ICON0x9add80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 0EnglishUnited States0.6065573770491803
                          RT_ICON0x9afc00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.6587837837837838
                          RT_DIALOG0x9b0e80x100dataEnglishUnited States0.5234375
                          RT_DIALOG0x9b1e80x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0x9b3080xc4dataEnglishUnited States0.5918367346938775
                          RT_DIALOG0x9b3d00x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0x9b4300xcadataEnglishUnited States0.5792079207920792
                          RT_VERSION0x9b5000x1f4dataEnglishUnited States0.518
                          RT_MANIFEST0x9b6f80x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                          DLLImport
                          KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetCurrentDirectoryA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                          USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                          SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                          ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 3, 2024 14:17:22.576697111 CEST4973880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:23.590233088 CEST4973880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:25.605452061 CEST4973880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:36.605089903 CEST4973980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:37.618419886 CEST4973980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:39.633624077 CEST4973980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:50.632771015 CEST4974080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:51.646667004 CEST4974080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:17:53.662022114 CEST4974080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:04.725640059 CEST4974180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:05.737349987 CEST4974180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:07.752557039 CEST4974180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:18.751543045 CEST4974280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:19.765633106 CEST4974280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:21.780874014 CEST4974280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:32.779400110 CEST4974380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:33.793848991 CEST4974380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:35.809022903 CEST4974380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:46.809158087 CEST4974480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:47.822016001 CEST4974480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:18:49.837243080 CEST4974480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:00.835855007 CEST4974580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:01.850342035 CEST4974580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:03.865442038 CEST4974580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:14.864026070 CEST4974680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:15.878465891 CEST4974680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:17.893649101 CEST4974680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:28.893241882 CEST4974780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:29.906625032 CEST4974780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:31.921875000 CEST4974780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:42.920509100 CEST4974880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:43.934879065 CEST4974880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:45.950073004 CEST4974880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:56.949103117 CEST4974980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:57.963097095 CEST4974980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:19:59.978214025 CEST4974980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:10.978086948 CEST4975080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:11.991259098 CEST4975080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:14.006638050 CEST4975080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:25.005249023 CEST4975180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:26.019575119 CEST4975180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:28.034696102 CEST4975180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:39.033361912 CEST4975280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:40.047707081 CEST4975280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:42.062971115 CEST4975280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:53.062751055 CEST4975380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:54.075937986 CEST4975380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:20:56.091088057 CEST4975380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:07.090069056 CEST4975480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:08.104120016 CEST4975480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:10.119343996 CEST4975480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:21.118056059 CEST4975580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:22.132329941 CEST4975580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:24.147664070 CEST4975580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:35.148611069 CEST4975680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:36.160602093 CEST4975680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:38.175738096 CEST4975680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:49.174567938 CEST4975780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:50.188801050 CEST4975780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:21:52.203917027 CEST4975780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:03.202718019 CEST4975880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:04.217061043 CEST4975880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:06.232176065 CEST4975880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:17.232595921 CEST4975980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:18.245254993 CEST4975980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:20.260291100 CEST4975980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:31.259556055 CEST4976680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:32.273390055 CEST4976680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:34.288577080 CEST4976680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:45.287309885 CEST4976780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:46.301640987 CEST4976780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:48.316817999 CEST4976780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:22:59.316665888 CEST4976880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:00.329916954 CEST4976880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:02.345037937 CEST4976880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:13.343765974 CEST4976980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:14.358019114 CEST4976980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:16.373150110 CEST4976980192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:27.371865988 CEST4977080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:28.386238098 CEST4977080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:30.401447058 CEST4977080192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:41.401272058 CEST4977180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:42.414417982 CEST4977180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:44.429620981 CEST4977180192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:55.428556919 CEST4977280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:56.442648888 CEST4977280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:23:58.457838058 CEST4977280192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:09.456590891 CEST4977380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:10.470784903 CEST4977380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:12.486087084 CEST4977380192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:23.485863924 CEST4977480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:24.499025106 CEST4977480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:26.514282942 CEST4977480192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:37.513063908 CEST4977580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:38.527241945 CEST4977580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:40.542536974 CEST4977580192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:51.541105032 CEST4977680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:52.555480003 CEST4977680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:24:54.570664883 CEST4977680192.168.11.20109.248.151.29
                          Jul 3, 2024 14:25:05.570657969 CEST4977780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:25:06.583648920 CEST4977780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:25:08.598891020 CEST4977780192.168.11.20109.248.151.29
                          Jul 3, 2024 14:25:19.597593069 CEST4977880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:25:20.611999035 CEST4977880192.168.11.20109.248.151.29
                          Jul 3, 2024 14:25:22.627140999 CEST4977880192.168.11.20109.248.151.29

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:08:17:04
                          Start date:03/07/2024
                          Path:C:\Users\user\Desktop\aMfizaMilo.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\aMfizaMilo.exe"
                          Imagebase:0x400000
                          File size:891'654 bytes
                          MD5 hash:95DC64015AA43A27412F7FF0979C5B87
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1921801552.00000000059D6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:3
                          Start time:08:17:15
                          Start date:03/07/2024
                          Path:C:\Users\user\Desktop\aMfizaMilo.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\aMfizaMilo.exe"
                          Imagebase:0x400000
                          File size:891'654 bytes
                          MD5 hash:95DC64015AA43A27412F7FF0979C5B87
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.6233337868.00000000021F6000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:23.8%
                            Dynamic/Decrypted Code Coverage:13.8%
                            Signature Coverage:20.9%
                            Total number of Nodes:1519
                            Total number of Limit Nodes:48
                            execution_graph 5136 10001000 5139 1000101b 5136->5139 5146 100014bb 5139->5146 5141 10001020 5142 10001024 5141->5142 5143 10001027 GlobalAlloc 5141->5143 5144 100014e2 3 API calls 5142->5144 5143->5142 5145 10001019 5144->5145 5148 100014c1 5146->5148 5147 100014c7 5147->5141 5148->5147 5149 100014d3 GlobalFree 5148->5149 5149->5141 4028 4025c4 4029 402a9f 17 API calls 4028->4029 4032 4025ce 4029->4032 4030 40263c 4032->4030 4033 40263e 4032->4033 4035 40264e 4032->4035 4037 405caa ReadFile 4032->4037 4039 405ff7 wsprintfA 4033->4039 4035->4030 4036 402664 SetFilePointer 4035->4036 4036->4030 4038 405cc8 4037->4038 4038->4032 4039->4030 4068 402245 4069 402ac1 17 API calls 4068->4069 4070 40224b 4069->4070 4071 402ac1 17 API calls 4070->4071 4072 402254 4071->4072 4073 402ac1 17 API calls 4072->4073 4074 40225d 4073->4074 4083 40639c FindFirstFileA 4074->4083 4077 402277 lstrlenA lstrlenA 4079 4051c0 24 API calls 4077->4079 4080 4022b3 SHFileOperationA 4079->4080 4081 40226a 4080->4081 4082 402272 4080->4082 4086 4051c0 4081->4086 4084 4063b2 FindClose 4083->4084 4085 402266 4083->4085 4084->4085 4085->4077 4085->4081 4087 4051db 4086->4087 4096 40527e 4086->4096 4088 4051f8 lstrlenA 4087->4088 4089 4060bb 17 API calls 4087->4089 4090 405221 4088->4090 4091 405206 lstrlenA 4088->4091 4089->4088 4092 405234 4090->4092 4093 405227 SetWindowTextA 4090->4093 4094 405218 lstrcatA 4091->4094 4091->4096 4095 40523a SendMessageA SendMessageA SendMessageA 4092->4095 4092->4096 4093->4092 4094->4090 4095->4096 4096->4082 5157 4028c5 5158 402a9f 17 API calls 5157->5158 5159 4028cb 5158->5159 5160 402900 5159->5160 5162 402716 5159->5162 5163 4028dd 5159->5163 5161 4060bb 17 API calls 5160->5161 5160->5162 5161->5162 5163->5162 5165 405ff7 wsprintfA 5163->5165 5165->5162 4097 401746 4098 402ac1 17 API calls 4097->4098 4099 40174d 4098->4099 4103 405c61 4099->4103 4101 401754 4102 405c61 2 API calls 4101->4102 4102->4101 4104 405c6c GetTickCount GetTempFileNameA 4103->4104 4105 405c9d 4104->4105 4106 405c99 4104->4106 4105->4101 4106->4104 4106->4105 5166 4022c7 5167 4022e1 5166->5167 5168 4022ce 5166->5168 5169 4060bb 17 API calls 5168->5169 5170 4022db 5169->5170 5171 4057b5 MessageBoxIndirectA 5170->5171 5171->5167 5172 401947 5173 402ac1 17 API calls 5172->5173 5174 40194e lstrlenA 5173->5174 5175 402577 5174->5175 4214 10002709 4215 10002759 4214->4215 4216 10002719 VirtualProtect 4214->4216 4216->4215 5179 4045ca 5180 4045f6 5179->5180 5181 404607 5179->5181 5240 405799 GetDlgItemTextA 5180->5240 5182 404613 GetDlgItem 5181->5182 5189 404672 5181->5189 5184 404627 5182->5184 5188 40463b SetWindowTextA 5184->5188 5192 405aca 4 API calls 5184->5192 5185 404756 5238 404900 5185->5238 5242 405799 GetDlgItemTextA 5185->5242 5186 404601 5187 406303 5 API calls 5186->5187 5187->5181 5193 40415a 18 API calls 5188->5193 5189->5185 5194 4060bb 17 API calls 5189->5194 5189->5238 5191 4041c1 8 API calls 5196 404914 5191->5196 5197 404631 5192->5197 5198 404657 5193->5198 5199 4046e6 SHBrowseForFolderA 5194->5199 5195 404786 5200 405b1f 18 API calls 5195->5200 5197->5188 5204 405a31 3 API calls 5197->5204 5201 40415a 18 API calls 5198->5201 5199->5185 5202 4046fe CoTaskMemFree 5199->5202 5203 40478c 5200->5203 5205 404665 5201->5205 5206 405a31 3 API calls 5202->5206 5243 406099 lstrcpynA 5203->5243 5204->5188 5241 40418f SendMessageA 5205->5241 5208 40470b 5206->5208 5211 404742 SetDlgItemTextA 5208->5211 5215 4060bb 17 API calls 5208->5215 5210 40466b 5214 406431 5 API calls 5210->5214 5211->5185 5212 4047a3 5213 406431 5 API calls 5212->5213 5221 4047aa 5213->5221 5214->5189 5216 40472a lstrcmpiA 5215->5216 5216->5211 5218 40473b lstrcatA 5216->5218 5217 4047e6 5244 406099 lstrcpynA 5217->5244 5218->5211 5220 4047ed 5222 405aca 4 API calls 5220->5222 5221->5217 5226 405a78 2 API calls 5221->5226 5227 40483e 5221->5227 5223 4047f3 GetDiskFreeSpaceA 5222->5223 5225 404817 MulDiv 5223->5225 5223->5227 5225->5227 5226->5221 5229 4048af 5227->5229 5245 404a46 5227->5245 5228 4048d2 5256 40417c KiUserCallbackDispatcher 5228->5256 5229->5228 5231 40140b 2 API calls 5229->5231 5231->5228 5233 4048b1 SetDlgItemTextA 5233->5229 5234 4048a1 5248 404981 5234->5248 5237 4048ee 5237->5238 5239 404523 SendMessageA 5237->5239 5238->5191 5239->5238 5240->5186 5241->5210 5242->5195 5243->5212 5244->5220 5246 404981 20 API calls 5245->5246 5247 40489c 5246->5247 5247->5233 5247->5234 5250 404997 5248->5250 5249 4060bb 17 API calls 5251 4049fb 5249->5251 5250->5249 5252 4060bb 17 API calls 5251->5252 5253 404a06 5252->5253 5254 4060bb 17 API calls 5253->5254 5255 404a1c lstrlenA wsprintfA SetDlgItemTextA 5254->5255 5255->5229 5256->5237 4217 4020cb 4218 402ac1 17 API calls 4217->4218 4219 4020d2 4218->4219 4220 402ac1 17 API calls 4219->4220 4221 4020dc 4220->4221 4222 402ac1 17 API calls 4221->4222 4223 4020e6 4222->4223 4224 402ac1 17 API calls 4223->4224 4225 4020f0 4224->4225 4226 402ac1 17 API calls 4225->4226 4227 4020fa 4226->4227 4228 40213c CoCreateInstance 4227->4228 4229 402ac1 17 API calls 4227->4229 4232 40215b 4228->4232 4234 402206 4228->4234 4229->4228 4231 40223c 4233 4021e6 MultiByteToWideChar 4232->4233 4232->4234 4233->4234 4234->4231 4235 401423 4234->4235 4236 4051c0 24 API calls 4235->4236 4237 401431 4236->4237 4237->4231 5257 1000180d 5258 10001830 5257->5258 5259 10001860 GlobalFree 5258->5259 5260 10001872 5258->5260 5259->5260 5261 10001266 2 API calls 5260->5261 5262 100019e3 GlobalFree GlobalFree 5261->5262 5263 4026ce 5264 4026d4 5263->5264 5265 4026d8 FindNextFileA 5264->5265 5268 4026ea 5264->5268 5266 402729 5265->5266 5265->5268 5269 406099 lstrcpynA 5266->5269 5269->5268 4677 4023d0 4678 402ac1 17 API calls 4677->4678 4679 4023e2 4678->4679 4680 402ac1 17 API calls 4679->4680 4681 4023ec 4680->4681 4694 402b51 4681->4694 4684 402421 4685 40242d 4684->4685 4687 402a9f 17 API calls 4684->4687 4688 40244c RegSetValueExA 4685->4688 4690 40303e 44 API calls 4685->4690 4686 402ac1 17 API calls 4689 40241a lstrlenA 4686->4689 4687->4685 4691 402462 RegCloseKey 4688->4691 4689->4684 4690->4688 4693 402716 4691->4693 4695 402b6c 4694->4695 4698 405f4d 4695->4698 4699 405f5c 4698->4699 4700 4023fc 4699->4700 4701 405f67 RegCreateKeyExA 4699->4701 4700->4684 4700->4686 4700->4693 4701->4700 5270 401cd4 5271 402a9f 17 API calls 5270->5271 5272 401cda IsWindow 5271->5272 5273 401a0e 5272->5273 4702 4014d6 4703 402a9f 17 API calls 4702->4703 4704 4014dc Sleep 4703->4704 4706 402951 4704->4706 4707 401759 4708 402ac1 17 API calls 4707->4708 4709 401760 4708->4709 4710 401786 4709->4710 4711 40177e 4709->4711 4748 406099 lstrcpynA 4710->4748 4747 406099 lstrcpynA 4711->4747 4714 401784 4718 406303 5 API calls 4714->4718 4715 401791 4716 405a31 3 API calls 4715->4716 4717 401797 lstrcatA 4716->4717 4717->4714 4731 4017a3 4718->4731 4719 40639c 2 API calls 4719->4731 4720 4017e4 4721 405c0d 2 API calls 4720->4721 4721->4731 4723 4017ba CompareFileTime 4723->4731 4724 40187e 4725 4051c0 24 API calls 4724->4725 4728 401888 4725->4728 4726 4051c0 24 API calls 4735 40186a 4726->4735 4727 406099 lstrcpynA 4727->4731 4729 40303e 44 API calls 4728->4729 4730 40189b 4729->4730 4732 4018af SetFileTime 4730->4732 4734 4018c1 FindCloseChangeNotification 4730->4734 4731->4719 4731->4720 4731->4723 4731->4724 4731->4727 4733 4060bb 17 API calls 4731->4733 4742 4057b5 MessageBoxIndirectA 4731->4742 4745 401855 4731->4745 4746 405c32 GetFileAttributesA CreateFileA 4731->4746 4732->4734 4733->4731 4734->4735 4736 4018d2 4734->4736 4737 4018d7 4736->4737 4738 4018ea 4736->4738 4740 4060bb 17 API calls 4737->4740 4739 4060bb 17 API calls 4738->4739 4741 4018f2 4739->4741 4743 4018df lstrcatA 4740->4743 4744 4057b5 MessageBoxIndirectA 4741->4744 4742->4731 4743->4741 4744->4735 4745->4726 4745->4735 4746->4731 4747->4714 4748->4715 5274 401659 5275 402ac1 17 API calls 5274->5275 5276 40165f 5275->5276 5277 40639c 2 API calls 5276->5277 5278 401665 5277->5278 5279 401959 5280 402a9f 17 API calls 5279->5280 5281 401960 5280->5281 5282 402a9f 17 API calls 5281->5282 5283 40196d 5282->5283 5284 402ac1 17 API calls 5283->5284 5285 401984 lstrlenA 5284->5285 5287 401994 5285->5287 5286 4019d4 5287->5286 5291 406099 lstrcpynA 5287->5291 5289 4019c4 5289->5286 5290 4019c9 lstrlenA 5289->5290 5290->5286 5291->5289 5292 1000161a 5293 10001649 5292->5293 5294 10001a5d 18 API calls 5293->5294 5295 10001650 5294->5295 5296 10001663 5295->5296 5297 10001657 5295->5297 5299 1000168a 5296->5299 5300 1000166d 5296->5300 5298 10001266 2 API calls 5297->5298 5308 10001661 5298->5308 5302 10001690 5299->5302 5303 100016b4 5299->5303 5301 100014e2 3 API calls 5300->5301 5306 10001672 5301->5306 5304 10001559 3 API calls 5302->5304 5305 100014e2 3 API calls 5303->5305 5307 10001695 5304->5307 5305->5308 5309 10001559 3 API calls 5306->5309 5310 10001266 2 API calls 5307->5310 5311 10001678 5309->5311 5312 1000169b GlobalFree 5310->5312 5313 10001266 2 API calls 5311->5313 5312->5308 5314 100016af GlobalFree 5312->5314 5315 1000167e GlobalFree 5313->5315 5314->5308 5315->5308 5323 401f5b 5324 402ac1 17 API calls 5323->5324 5325 401f62 5324->5325 5326 406431 5 API calls 5325->5326 5327 401f71 5326->5327 5328 401f89 GlobalAlloc 5327->5328 5337 401ff1 5327->5337 5329 401f9d 5328->5329 5328->5337 5330 406431 5 API calls 5329->5330 5331 401fa4 5330->5331 5332 406431 5 API calls 5331->5332 5333 401fae 5332->5333 5333->5337 5338 405ff7 wsprintfA 5333->5338 5335 401fe5 5339 405ff7 wsprintfA 5335->5339 5338->5335 5339->5337 5340 40255b 5341 402ac1 17 API calls 5340->5341 5342 402562 5341->5342 5345 405c32 GetFileAttributesA CreateFileA 5342->5345 5344 40256e 5345->5344 5353 401b5d 5354 401bae 5353->5354 5359 401b6a 5353->5359 5355 401bb2 5354->5355 5356 401bd7 GlobalAlloc 5354->5356 5369 4022e1 5355->5369 5374 406099 lstrcpynA 5355->5374 5358 4060bb 17 API calls 5356->5358 5357 4060bb 17 API calls 5362 4022db 5357->5362 5363 401bf2 5358->5363 5360 401b81 5359->5360 5359->5363 5372 406099 lstrcpynA 5360->5372 5367 4057b5 MessageBoxIndirectA 5362->5367 5363->5357 5363->5369 5365 401bc4 GlobalFree 5365->5369 5366 401b90 5373 406099 lstrcpynA 5366->5373 5367->5369 5370 401b9f 5375 406099 lstrcpynA 5370->5375 5372->5366 5373->5370 5374->5365 5375->5369 5376 401a5e 5377 402a9f 17 API calls 5376->5377 5378 401a64 5377->5378 5379 402a9f 17 API calls 5378->5379 5380 401a0e 5379->5380 4753 4024df 4765 402b01 4753->4765 4756 402a9f 17 API calls 4757 4024f2 4756->4757 4758 402500 4757->4758 4759 402716 4757->4759 4760 402519 RegEnumValueA 4758->4760 4761 40250d RegEnumKeyA 4758->4761 4762 402535 RegCloseKey 4760->4762 4763 40252e 4760->4763 4761->4762 4762->4759 4763->4762 4766 402ac1 17 API calls 4765->4766 4767 402b18 4766->4767 4768 405f1f RegOpenKeyExA 4767->4768 4769 4024e9 4768->4769 4769->4756 5381 402c61 5382 402c70 SetTimer 5381->5382 5383 402c89 5381->5383 5382->5383 5384 402cd7 5383->5384 5385 402cdd MulDiv 5383->5385 5386 402c97 wsprintfA SetWindowTextA SetDlgItemTextA 5385->5386 5386->5384 5395 401563 5396 4028f9 5395->5396 5399 405ff7 wsprintfA 5396->5399 5398 4028fe 5399->5398 5400 40166a 5401 402ac1 17 API calls 5400->5401 5402 401671 5401->5402 5403 402ac1 17 API calls 5402->5403 5404 40167a 5403->5404 5405 402ac1 17 API calls 5404->5405 5406 401683 MoveFileA 5405->5406 5407 401696 5406->5407 5408 40168f 5406->5408 5409 40639c 2 API calls 5407->5409 5412 40223c 5407->5412 5410 401423 24 API calls 5408->5410 5411 4016a5 5409->5411 5410->5412 5411->5412 5413 405e78 36 API calls 5411->5413 5413->5408 4820 40246d 4821 402b01 17 API calls 4820->4821 4822 402477 4821->4822 4823 402ac1 17 API calls 4822->4823 4824 402480 4823->4824 4825 40248a RegQueryValueExA 4824->4825 4827 402716 4824->4827 4826 4024aa 4825->4826 4830 4024b0 RegCloseKey 4825->4830 4826->4830 4831 405ff7 wsprintfA 4826->4831 4830->4827 4831->4830 5414 4019ed 5415 402ac1 17 API calls 5414->5415 5416 4019f4 5415->5416 5417 402ac1 17 API calls 5416->5417 5418 4019fd 5417->5418 5419 401a04 lstrcmpiA 5418->5419 5420 401a16 lstrcmpA 5418->5420 5421 401a0a 5419->5421 5420->5421 5422 40426e lstrcpynA lstrlenA 4832 40156f 4833 401586 4832->4833 4834 40157f ShowWindow 4832->4834 4835 402951 4833->4835 4836 401594 ShowWindow 4833->4836 4834->4833 4836->4835 5430 100015b3 5431 100014bb GlobalFree 5430->5431 5434 100015cb 5431->5434 5432 10001611 GlobalFree 5433 100015e6 5433->5432 5434->5432 5434->5433 5435 100015fd VirtualFree 5434->5435 5435->5432 5436 4014f4 SetForegroundWindow 5437 402951 5436->5437 5438 401cf5 5439 402a9f 17 API calls 5438->5439 5440 401cfc 5439->5440 5441 402a9f 17 API calls 5440->5441 5442 401d08 GetDlgItem 5441->5442 5443 402577 5442->5443 4843 4022f6 4844 402304 4843->4844 4845 4022fe 4843->4845 4847 402314 4844->4847 4848 402ac1 17 API calls 4844->4848 4846 402ac1 17 API calls 4845->4846 4846->4844 4849 402322 4847->4849 4851 402ac1 17 API calls 4847->4851 4848->4847 4850 402ac1 17 API calls 4849->4850 4852 40232b WritePrivateProfileStringA 4850->4852 4851->4849 5444 4026f8 5445 402ac1 17 API calls 5444->5445 5446 4026ff FindFirstFileA 5445->5446 5447 402722 5446->5447 5450 402712 5446->5450 5448 402729 5447->5448 5452 405ff7 wsprintfA 5447->5452 5453 406099 lstrcpynA 5448->5453 5452->5448 5453->5450 4860 40237b 4861 402382 4860->4861 4862 4023ad 4860->4862 4864 402b01 17 API calls 4861->4864 4863 402ac1 17 API calls 4862->4863 4865 4023b4 4863->4865 4866 402389 4864->4866 4872 402b7f 4865->4872 4868 402393 4866->4868 4869 4023c1 4866->4869 4870 402ac1 17 API calls 4868->4870 4871 40239a RegDeleteValueA RegCloseKey 4870->4871 4871->4869 4873 402b95 4872->4873 4875 402bab 4873->4875 4876 402bb4 4873->4876 4875->4869 4877 405f1f RegOpenKeyExA 4876->4877 4878 402be2 4877->4878 4879 402c5a 4878->4879 4881 402be6 4878->4881 4879->4875 4880 402c08 RegEnumKeyA 4880->4881 4882 402c1f RegCloseKey 4880->4882 4881->4880 4881->4882 4883 402c40 RegCloseKey 4881->4883 4885 402bb4 6 API calls 4881->4885 4884 406431 5 API calls 4882->4884 4883->4879 4886 402c2f 4884->4886 4885->4881 4887 402c33 4886->4887 4888 402c4e RegDeleteKeyA 4886->4888 4887->4879 4888->4879 4909 401ffd 4910 4020bd 4909->4910 4911 40200f 4909->4911 4913 401423 24 API calls 4910->4913 4912 402ac1 17 API calls 4911->4912 4914 402016 4912->4914 4920 40223c 4913->4920 4915 402ac1 17 API calls 4914->4915 4916 40201f 4915->4916 4917 402034 LoadLibraryExA 4916->4917 4918 402027 GetModuleHandleA 4916->4918 4917->4910 4919 402044 GetProcAddress 4917->4919 4918->4917 4918->4919 4921 402090 4919->4921 4922 402053 4919->4922 4925 4051c0 24 API calls 4921->4925 4923 402072 4922->4923 4924 40205b 4922->4924 4930 100016bd 4923->4930 4926 401423 24 API calls 4924->4926 4927 402063 4925->4927 4926->4927 4927->4920 4928 4020b1 FreeLibrary 4927->4928 4928->4920 4931 100016ed 4930->4931 4972 10001a5d 4931->4972 4933 100016f4 4934 1000180a 4933->4934 4935 10001705 4933->4935 4936 1000170c 4933->4936 4934->4927 5020 100021b0 4935->5020 5004 100021fa 4936->5004 4941 10001770 4945 100017b2 4941->4945 4946 10001776 4941->4946 4942 10001752 5033 100023d8 4942->5033 4943 10001722 4948 10001728 4943->4948 4953 10001733 4943->4953 4944 1000173b 4957 10001731 4944->4957 5030 10002a9f 4944->5030 4951 100023d8 11 API calls 4945->4951 4949 10001559 3 API calls 4946->4949 4948->4957 5014 100027e4 4948->5014 4956 1000178c 4949->4956 4958 100017a4 4951->4958 4952 10001758 5044 10001559 4952->5044 5024 10002587 4953->5024 4961 100023d8 11 API calls 4956->4961 4957->4941 4957->4942 4963 100017f9 4958->4963 5055 1000239e 4958->5055 4960 10001739 4960->4957 4961->4958 4963->4934 4965 10001803 GlobalFree 4963->4965 4965->4934 4969 100017e5 4969->4963 5059 100014e2 wsprintfA 4969->5059 4971 100017de FreeLibrary 4971->4969 5062 10001215 GlobalAlloc 4972->5062 4974 10001a81 5063 10001215 GlobalAlloc 4974->5063 4976 10001cbb GlobalFree GlobalFree GlobalFree 4977 10001cd8 4976->4977 4993 10001d22 4976->4993 4978 1000201a 4977->4978 4985 10001ced 4977->4985 4977->4993 4980 1000203c GetModuleHandleA 4978->4980 4978->4993 4979 10001b60 GlobalAlloc 4992 10001a8c 4979->4992 4983 10002062 4980->4983 4984 1000204d LoadLibraryA 4980->4984 4981 10001bab lstrcpyA 4986 10001bb5 lstrcpyA 4981->4986 4982 10001bc9 GlobalFree 4982->4992 5070 100015a4 GetProcAddress 4983->5070 4984->4983 4984->4993 4985->4993 5066 10001224 4985->5066 4986->4992 4988 100020b3 4989 100020c0 lstrlenA 4988->4989 4988->4993 5071 100015a4 GetProcAddress 4989->5071 4991 10001f7a 4991->4993 4997 10001fbe lstrcpyA 4991->4997 4992->4976 4992->4979 4992->4981 4992->4982 4992->4986 4992->4991 4992->4993 4998 10001e75 GlobalFree 4992->4998 5000 10001224 2 API calls 4992->5000 5002 10001c07 4992->5002 5069 10001215 GlobalAlloc 4992->5069 4993->4933 4994 10002074 4994->4988 5003 1000209d GetProcAddress 4994->5003 4997->4993 4998->4992 5000->4992 5001 100020d9 5001->4993 5002->4992 5064 10001534 GlobalSize GlobalAlloc 5002->5064 5003->4988 5005 10002212 5004->5005 5007 10002347 GlobalFree 5005->5007 5009 100022bb GlobalAlloc MultiByteToWideChar 5005->5009 5010 10001224 GlobalAlloc lstrcpynA 5005->5010 5012 10002306 5005->5012 5073 100012ad 5005->5073 5007->5005 5008 10001712 5007->5008 5008->4943 5008->4944 5008->4957 5011 100022e5 GlobalAlloc CLSIDFromString GlobalFree 5009->5011 5009->5012 5010->5005 5011->5007 5012->5007 5077 1000251b 5012->5077 5016 100027f6 5014->5016 5015 1000289b ReadFile 5017 100028b9 5015->5017 5016->5015 5018 100029b5 5017->5018 5019 100029aa GetLastError 5017->5019 5018->4957 5019->5018 5021 100021c0 5020->5021 5022 1000170b 5020->5022 5021->5022 5023 100021d2 GlobalAlloc 5021->5023 5022->4936 5023->5021 5028 100025a3 5024->5028 5025 100025f4 GlobalAlloc 5029 10002616 5025->5029 5026 10002607 5027 1000260c GlobalSize 5026->5027 5026->5029 5027->5029 5028->5025 5028->5026 5029->4960 5031 10002aaa 5030->5031 5032 10002aea GlobalFree 5031->5032 5080 10001215 GlobalAlloc 5033->5080 5035 10002438 lstrcpynA 5040 100023e4 5035->5040 5036 10002449 StringFromGUID2 WideCharToMultiByte 5036->5040 5037 1000246d WideCharToMultiByte 5037->5040 5038 100024b2 GlobalFree 5038->5040 5039 1000248e wsprintfA 5039->5040 5040->5035 5040->5036 5040->5037 5040->5038 5040->5039 5041 100024ec GlobalFree 5040->5041 5042 10001266 2 API calls 5040->5042 5081 100012d1 5040->5081 5041->4952 5042->5040 5085 10001215 GlobalAlloc 5044->5085 5046 1000155f 5047 1000156c lstrcpyA 5046->5047 5049 10001586 5046->5049 5050 100015a0 5047->5050 5049->5050 5051 1000158b wsprintfA 5049->5051 5052 10001266 5050->5052 5051->5050 5053 100012a8 GlobalFree 5052->5053 5054 1000126f GlobalAlloc lstrcpynA 5052->5054 5053->4958 5054->5053 5056 100017c5 5055->5056 5057 100023ac 5055->5057 5056->4969 5056->4971 5057->5056 5058 100023c5 GlobalFree 5057->5058 5058->5057 5060 10001266 2 API calls 5059->5060 5061 10001503 5060->5061 5061->4963 5062->4974 5063->4992 5065 10001552 5064->5065 5065->5002 5072 10001215 GlobalAlloc 5066->5072 5068 10001233 lstrcpynA 5068->4993 5069->4992 5070->4994 5071->5001 5072->5068 5074 100012b4 5073->5074 5075 10001224 2 API calls 5074->5075 5076 100012cf 5075->5076 5076->5005 5078 10002529 VirtualAlloc 5077->5078 5079 1000257f 5077->5079 5078->5079 5079->5012 5080->5040 5082 100012f9 5081->5082 5083 100012da 5081->5083 5082->5040 5083->5082 5084 100012e0 lstrcpyA 5083->5084 5084->5082 5085->5046 5454 1000103d 5455 1000101b 5 API calls 5454->5455 5456 10001056 5455->5456 5457 4018fd 5458 401934 5457->5458 5459 402ac1 17 API calls 5458->5459 5460 401939 5459->5460 5461 405861 67 API calls 5460->5461 5462 401942 5461->5462 5463 40257d 5464 402582 5463->5464 5465 402596 5463->5465 5466 402a9f 17 API calls 5464->5466 5467 402ac1 17 API calls 5465->5467 5469 40258b 5466->5469 5468 40259d lstrlenA 5467->5468 5468->5469 5470 4025bf 5469->5470 5471 405cd9 WriteFile 5469->5471 5471->5470 5086 4052fe 5087 405320 GetDlgItem GetDlgItem GetDlgItem 5086->5087 5088 4054a9 5086->5088 5132 40418f SendMessageA 5087->5132 5090 4054b1 GetDlgItem CreateThread FindCloseChangeNotification 5088->5090 5092 4054d9 5088->5092 5090->5092 5135 405292 5 API calls 5090->5135 5091 405507 5093 405562 5091->5093 5094 40550f 5091->5094 5092->5091 5096 405528 5092->5096 5097 4054ef ShowWindow ShowWindow 5092->5097 5093->5096 5109 40556f SendMessageA 5093->5109 5098 405517 5094->5098 5099 40553b ShowWindow 5094->5099 5095 405390 5101 405397 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5095->5101 5100 4041c1 8 API calls 5096->5100 5134 40418f SendMessageA 5097->5134 5103 404133 SendMessageA 5098->5103 5105 40555b 5099->5105 5106 40554d 5099->5106 5104 405534 5100->5104 5107 405405 5101->5107 5108 4053e9 SendMessageA SendMessageA 5101->5108 5103->5096 5111 404133 SendMessageA 5105->5111 5110 4051c0 24 API calls 5106->5110 5112 405418 5107->5112 5113 40540a SendMessageA 5107->5113 5108->5107 5109->5104 5114 405588 CreatePopupMenu 5109->5114 5110->5105 5111->5093 5115 40415a 18 API calls 5112->5115 5113->5112 5116 4060bb 17 API calls 5114->5116 5118 405428 5115->5118 5117 405598 AppendMenuA 5116->5117 5119 4055b6 GetWindowRect 5117->5119 5120 4055c9 TrackPopupMenu 5117->5120 5121 405431 ShowWindow 5118->5121 5122 405465 GetDlgItem SendMessageA 5118->5122 5119->5120 5120->5104 5123 4055e5 5120->5123 5124 405454 5121->5124 5125 405447 ShowWindow 5121->5125 5122->5104 5126 40548c SendMessageA SendMessageA 5122->5126 5127 405604 SendMessageA 5123->5127 5133 40418f SendMessageA 5124->5133 5125->5124 5126->5104 5127->5127 5128 405621 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5127->5128 5130 405643 SendMessageA 5128->5130 5130->5130 5131 405665 GlobalUnlock SetClipboardData CloseClipboard 5130->5131 5131->5104 5132->5095 5133->5122 5134->5091 5472 100029bf 5473 100029d7 5472->5473 5474 10001534 2 API calls 5473->5474 5475 100029f2 5474->5475 5476 401000 5477 401037 BeginPaint GetClientRect 5476->5477 5478 40100c DefWindowProcA 5476->5478 5480 4010f3 5477->5480 5481 401179 5478->5481 5482 401073 CreateBrushIndirect FillRect DeleteObject 5480->5482 5483 4010fc 5480->5483 5482->5480 5484 401102 CreateFontIndirectA 5483->5484 5485 401167 EndPaint 5483->5485 5484->5485 5486 401112 6 API calls 5484->5486 5485->5481 5486->5485 5487 401900 5488 402ac1 17 API calls 5487->5488 5489 401907 5488->5489 5490 4057b5 MessageBoxIndirectA 5489->5490 5491 401910 5490->5491 3974 402682 3975 402689 3974->3975 3981 4028fe 3974->3981 3982 402a9f 3975->3982 3977 402690 3978 40269f SetFilePointer 3977->3978 3979 4026af 3978->3979 3978->3981 3985 405ff7 wsprintfA 3979->3985 3986 4060bb 3982->3986 3984 402ab4 3984->3977 3985->3981 4002 4060c8 3986->4002 3987 4062ea 3988 4062ff 3987->3988 4019 406099 lstrcpynA 3987->4019 3988->3984 3990 4062c4 lstrlenA 3990->4002 3991 4060bb 10 API calls 3991->3990 3995 4061e0 GetSystemDirectoryA 3995->4002 3996 4061f3 GetWindowsDirectoryA 3996->4002 3998 4060bb 10 API calls 3998->4002 3999 40626d lstrcatA 3999->4002 4000 406227 SHGetSpecialFolderLocation 4001 40623f SHGetPathFromIDListA CoTaskMemFree 4000->4001 4000->4002 4001->4002 4002->3987 4002->3990 4002->3991 4002->3995 4002->3996 4002->3998 4002->3999 4002->4000 4003 405f80 4002->4003 4008 406303 4002->4008 4017 405ff7 wsprintfA 4002->4017 4018 406099 lstrcpynA 4002->4018 4020 405f1f 4003->4020 4006 405fb4 RegQueryValueExA RegCloseKey 4007 405fe3 4006->4007 4007->4002 4009 40630f 4008->4009 4011 40636c CharNextA 4009->4011 4013 406377 4009->4013 4015 40635a CharNextA 4009->4015 4016 406367 CharNextA 4009->4016 4024 405a5c 4009->4024 4010 40637b CharPrevA 4010->4013 4011->4009 4011->4013 4013->4010 4014 406396 4013->4014 4014->4002 4015->4009 4016->4011 4017->4002 4018->4002 4019->3988 4021 405f2e 4020->4021 4022 405f32 4021->4022 4023 405f37 RegOpenKeyExA 4021->4023 4022->4006 4022->4007 4023->4022 4025 405a62 4024->4025 4026 405a75 4025->4026 4027 405a68 CharNextA 4025->4027 4026->4009 4027->4025 5492 401502 5493 40150a 5492->5493 5495 40151d 5492->5495 5494 402a9f 17 API calls 5493->5494 5494->5495 5496 404583 5497 404593 5496->5497 5498 4045b9 5496->5498 5500 40415a 18 API calls 5497->5500 5499 4041c1 8 API calls 5498->5499 5502 4045c5 5499->5502 5501 4045a0 SetDlgItemTextA 5500->5501 5501->5498 4040 401c04 4041 402a9f 17 API calls 4040->4041 4042 401c0b 4041->4042 4043 402a9f 17 API calls 4042->4043 4044 401c18 4043->4044 4045 402ac1 17 API calls 4044->4045 4046 401c2d 4044->4046 4045->4046 4047 402ac1 17 API calls 4046->4047 4051 401c3d 4046->4051 4047->4051 4048 401c94 4062 402ac1 4048->4062 4049 401c48 4052 402a9f 17 API calls 4049->4052 4051->4048 4051->4049 4054 401c4d 4052->4054 4056 402a9f 17 API calls 4054->4056 4055 402ac1 17 API calls 4057 401ca2 FindWindowExA 4055->4057 4058 401c59 4056->4058 4061 401cc0 4057->4061 4059 401c84 SendMessageA 4058->4059 4060 401c66 SendMessageTimeoutA 4058->4060 4059->4061 4060->4061 4063 402acd 4062->4063 4064 4060bb 17 API calls 4063->4064 4065 402aee 4064->4065 4066 401c99 4065->4066 4067 406303 5 API calls 4065->4067 4066->4055 4067->4066 4107 403c86 4108 403dd9 4107->4108 4109 403c9e 4107->4109 4111 403e2a 4108->4111 4112 403dea GetDlgItem GetDlgItem 4108->4112 4109->4108 4110 403caa 4109->4110 4114 403cb5 SetWindowPos 4110->4114 4115 403cc8 4110->4115 4113 403e84 4111->4113 4121 401389 2 API calls 4111->4121 4116 40415a 18 API calls 4112->4116 4137 403dd4 4113->4137 4178 4041a6 4113->4178 4114->4115 4118 403ce5 4115->4118 4119 403ccd ShowWindow 4115->4119 4120 403e14 SetClassLongA 4116->4120 4122 403d07 4118->4122 4123 403ced DestroyWindow 4118->4123 4119->4118 4124 40140b 2 API calls 4120->4124 4127 403e5c 4121->4127 4125 403d0c SetWindowLongA 4122->4125 4126 403d1d 4122->4126 4177 4040e3 4123->4177 4124->4111 4125->4137 4128 403dc6 4126->4128 4129 403d29 GetDlgItem 4126->4129 4127->4113 4130 403e60 SendMessageA 4127->4130 4200 4041c1 4128->4200 4133 403d59 4129->4133 4134 403d3c SendMessageA IsWindowEnabled 4129->4134 4130->4137 4131 40140b 2 API calls 4145 403e96 4131->4145 4132 4040e5 DestroyWindow EndDialog 4132->4177 4139 403d66 4133->4139 4142 403dad SendMessageA 4133->4142 4143 403d79 4133->4143 4151 403d5e 4133->4151 4134->4133 4134->4137 4136 404114 ShowWindow 4136->4137 4138 4060bb 17 API calls 4138->4145 4139->4142 4139->4151 4141 40415a 18 API calls 4141->4145 4142->4128 4146 403d81 4143->4146 4147 403d96 4143->4147 4144 403d94 4144->4128 4145->4131 4145->4132 4145->4137 4145->4138 4145->4141 4168 404025 DestroyWindow 4145->4168 4181 40415a 4145->4181 4194 40140b 4146->4194 4148 40140b 2 API calls 4147->4148 4150 403d9d 4148->4150 4150->4128 4150->4151 4197 404133 4151->4197 4153 403f11 GetDlgItem 4154 403f26 4153->4154 4155 403f2e ShowWindow KiUserCallbackDispatcher 4153->4155 4154->4155 4184 40417c KiUserCallbackDispatcher 4155->4184 4157 403f58 EnableWindow 4162 403f6c 4157->4162 4158 403f71 GetSystemMenu EnableMenuItem SendMessageA 4159 403fa1 SendMessageA 4158->4159 4158->4162 4159->4162 4162->4158 4185 40418f SendMessageA 4162->4185 4186 403c67 4162->4186 4189 406099 lstrcpynA 4162->4189 4164 403fd0 lstrlenA 4165 4060bb 17 API calls 4164->4165 4166 403fe1 SetWindowTextA 4165->4166 4190 401389 4166->4190 4169 40403f CreateDialogParamA 4168->4169 4168->4177 4170 404072 4169->4170 4169->4177 4171 40415a 18 API calls 4170->4171 4172 40407d GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4171->4172 4173 401389 2 API calls 4172->4173 4174 4040c3 4173->4174 4174->4137 4175 4040cb ShowWindow 4174->4175 4176 4041a6 SendMessageA 4175->4176 4176->4177 4177->4136 4177->4137 4179 4041be 4178->4179 4180 4041af SendMessageA 4178->4180 4179->4145 4180->4179 4182 4060bb 17 API calls 4181->4182 4183 404165 SetDlgItemTextA 4182->4183 4183->4153 4184->4157 4185->4162 4187 4060bb 17 API calls 4186->4187 4188 403c75 SetWindowTextA 4187->4188 4188->4162 4189->4164 4192 401390 4190->4192 4191 4013fe 4191->4145 4192->4191 4193 4013cb MulDiv SendMessageA 4192->4193 4193->4192 4195 401389 2 API calls 4194->4195 4196 401420 4195->4196 4196->4151 4198 404140 SendMessageA 4197->4198 4199 40413a 4197->4199 4198->4144 4199->4198 4201 404262 4200->4201 4202 4041d9 GetWindowLongA 4200->4202 4201->4137 4202->4201 4203 4041ea 4202->4203 4204 4041f9 GetSysColor 4203->4204 4205 4041fc 4203->4205 4204->4205 4206 404202 SetTextColor 4205->4206 4207 40420c SetBkMode 4205->4207 4206->4207 4208 404224 GetSysColor 4207->4208 4209 40422a 4207->4209 4208->4209 4210 404231 SetBkColor 4209->4210 4211 40423b 4209->4211 4210->4211 4211->4201 4212 404255 CreateBrushIndirect 4211->4212 4213 40424e DeleteObject 4211->4213 4212->4201 4213->4212 4238 40330d SetErrorMode GetVersion 4239 40334e 4238->4239 4240 403354 4238->4240 4241 406431 5 API calls 4239->4241 4329 4063c3 GetSystemDirectoryA 4240->4329 4241->4240 4243 40336a lstrlenA 4243->4240 4244 403379 4243->4244 4332 406431 GetModuleHandleA 4244->4332 4247 406431 5 API calls 4248 403387 4247->4248 4249 406431 5 API calls 4248->4249 4250 403393 #17 OleInitialize SHGetFileInfoA 4249->4250 4338 406099 lstrcpynA 4250->4338 4253 4033df GetCommandLineA 4339 406099 lstrcpynA 4253->4339 4255 4033f1 GetModuleHandleA 4256 403408 4255->4256 4257 405a5c CharNextA 4256->4257 4258 40341c CharNextA 4257->4258 4267 40342c 4258->4267 4259 4034f6 4260 403509 GetTempPathA 4259->4260 4340 4032dc 4260->4340 4262 403521 4264 403525 GetWindowsDirectoryA lstrcatA 4262->4264 4265 40357b DeleteFileA 4262->4265 4263 405a5c CharNextA 4263->4267 4268 4032dc 12 API calls 4264->4268 4350 402d98 GetTickCount GetModuleFileNameA 4265->4350 4267->4259 4267->4263 4269 4034f8 4267->4269 4271 403541 4268->4271 4447 406099 lstrcpynA 4269->4447 4270 40358f 4272 403625 4270->4272 4276 403615 4270->4276 4280 405a5c CharNextA 4270->4280 4271->4265 4274 403545 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4271->4274 4464 4037f7 4272->4464 4275 4032dc 12 API calls 4274->4275 4278 403573 4275->4278 4380 4038e9 4276->4380 4278->4265 4278->4272 4282 4035aa 4280->4282 4291 4035f0 4282->4291 4292 403655 4282->4292 4283 40375d 4285 403765 GetCurrentProcess OpenProcessToken 4283->4285 4286 4037df ExitProcess 4283->4286 4284 40363f 4473 4057b5 4284->4473 4288 4037b0 4285->4288 4289 403780 LookupPrivilegeValueA AdjustTokenPrivileges 4285->4289 4294 406431 5 API calls 4288->4294 4289->4288 4448 405b1f 4291->4448 4436 405720 4292->4436 4298 4037b7 4294->4298 4302 4037cc ExitWindowsEx 4298->4302 4305 4037d8 4298->4305 4300 403676 lstrcatA lstrcmpiA 4300->4272 4304 403692 4300->4304 4301 40366b lstrcatA 4301->4300 4302->4286 4302->4305 4307 403697 4304->4307 4308 40369e 4304->4308 4309 40140b 2 API calls 4305->4309 4306 40360a 4463 406099 lstrcpynA 4306->4463 4477 405686 CreateDirectoryA 4307->4477 4482 405703 CreateDirectoryA 4308->4482 4309->4286 4314 4036a3 SetCurrentDirectoryA 4315 4036b2 4314->4315 4316 4036bd 4314->4316 4485 406099 lstrcpynA 4315->4485 4439 406099 lstrcpynA 4316->4439 4319 4060bb 17 API calls 4320 4036fc DeleteFileA 4319->4320 4321 403709 CopyFileA 4320->4321 4326 4036cb 4320->4326 4321->4326 4322 403751 4324 405e78 36 API calls 4322->4324 4324->4272 4325 4060bb 17 API calls 4325->4326 4326->4319 4326->4322 4326->4325 4328 40373d CloseHandle 4326->4328 4440 405e78 MoveFileExA 4326->4440 4444 405738 CreateProcessA 4326->4444 4328->4326 4330 4063e5 wsprintfA LoadLibraryExA 4329->4330 4330->4243 4333 406457 GetProcAddress 4332->4333 4334 40644d 4332->4334 4336 403380 4333->4336 4335 4063c3 3 API calls 4334->4335 4337 406453 4335->4337 4336->4247 4337->4333 4337->4336 4338->4253 4339->4255 4341 406303 5 API calls 4340->4341 4343 4032e8 4341->4343 4342 4032f2 4342->4262 4343->4342 4486 405a31 lstrlenA CharPrevA 4343->4486 4346 405703 2 API calls 4347 403300 4346->4347 4348 405c61 2 API calls 4347->4348 4349 40330b 4348->4349 4349->4262 4489 405c32 GetFileAttributesA CreateFileA 4350->4489 4352 402ddb 4379 402de8 4352->4379 4490 406099 lstrcpynA 4352->4490 4354 402dfe 4491 405a78 lstrlenA 4354->4491 4358 402e0f GetFileSize 4359 402f10 4358->4359 4378 402e26 4358->4378 4496 402cf9 4359->4496 4363 402f53 GlobalAlloc 4366 402f6a 4363->4366 4364 402fab 4367 402cf9 32 API calls 4364->4367 4371 405c61 2 API calls 4366->4371 4367->4379 4368 402f34 4369 4032af ReadFile 4368->4369 4372 402f3f 4369->4372 4370 402cf9 32 API calls 4370->4378 4373 402f7b CreateFileA 4371->4373 4372->4363 4372->4379 4374 402fb5 4373->4374 4373->4379 4511 4032c5 SetFilePointer 4374->4511 4376 402fc3 4512 40303e 4376->4512 4378->4359 4378->4364 4378->4370 4378->4379 4527 4032af 4378->4527 4379->4270 4381 406431 5 API calls 4380->4381 4382 4038fd 4381->4382 4383 403903 4382->4383 4384 403915 4382->4384 4576 405ff7 wsprintfA 4383->4576 4385 405f80 3 API calls 4384->4385 4386 403940 4385->4386 4388 40395e lstrcatA 4386->4388 4390 405f80 3 API calls 4386->4390 4389 403913 4388->4389 4561 403bae 4389->4561 4390->4388 4393 405b1f 18 API calls 4394 403990 4393->4394 4395 403a19 4394->4395 4397 405f80 3 API calls 4394->4397 4396 405b1f 18 API calls 4395->4396 4398 403a1f 4396->4398 4399 4039bc 4397->4399 4400 403a2f LoadImageA 4398->4400 4401 4060bb 17 API calls 4398->4401 4399->4395 4404 4039d8 lstrlenA 4399->4404 4408 405a5c CharNextA 4399->4408 4402 403ad5 4400->4402 4403 403a56 RegisterClassA 4400->4403 4401->4400 4407 40140b 2 API calls 4402->4407 4405 403adf 4403->4405 4406 403a8c SystemParametersInfoA CreateWindowExA 4403->4406 4409 4039e6 lstrcmpiA 4404->4409 4410 403a0c 4404->4410 4405->4272 4406->4402 4411 403adb 4407->4411 4412 4039d6 4408->4412 4409->4410 4413 4039f6 GetFileAttributesA 4409->4413 4414 405a31 3 API calls 4410->4414 4411->4405 4416 403bae 18 API calls 4411->4416 4412->4404 4415 403a02 4413->4415 4417 403a12 4414->4417 4415->4410 4419 405a78 2 API calls 4415->4419 4420 403aec 4416->4420 4577 406099 lstrcpynA 4417->4577 4419->4410 4421 403af8 ShowWindow 4420->4421 4422 403b7b 4420->4422 4423 4063c3 3 API calls 4421->4423 4569 405292 OleInitialize 4422->4569 4426 403b10 4423->4426 4425 403b81 4428 403b85 4425->4428 4429 403b9d 4425->4429 4427 403b1e GetClassInfoA 4426->4427 4430 4063c3 3 API calls 4426->4430 4432 403b32 GetClassInfoA RegisterClassA 4427->4432 4433 403b48 DialogBoxParamA 4427->4433 4428->4405 4434 40140b 2 API calls 4428->4434 4431 40140b 2 API calls 4429->4431 4430->4427 4431->4405 4432->4433 4435 40140b 2 API calls 4433->4435 4434->4405 4435->4405 4437 406431 5 API calls 4436->4437 4438 40365a lstrcatA 4437->4438 4438->4300 4438->4301 4439->4326 4441 405e8c 4440->4441 4443 405e99 4440->4443 4579 405d08 4441->4579 4443->4326 4445 405777 4444->4445 4446 40576b CloseHandle 4444->4446 4445->4326 4446->4445 4447->4260 4613 406099 lstrcpynA 4448->4613 4450 405b30 4614 405aca CharNextA CharNextA 4450->4614 4453 4035fb 4453->4272 4462 406099 lstrcpynA 4453->4462 4454 406303 5 API calls 4457 405b46 4454->4457 4455 405b71 lstrlenA 4456 405b7c 4455->4456 4455->4457 4459 405a31 3 API calls 4456->4459 4457->4453 4457->4455 4458 40639c 2 API calls 4457->4458 4461 405a78 2 API calls 4457->4461 4458->4457 4460 405b81 GetFileAttributesA 4459->4460 4460->4453 4461->4455 4462->4306 4463->4276 4465 403812 4464->4465 4466 403808 CloseHandle 4464->4466 4467 403826 4465->4467 4468 40381c CloseHandle 4465->4468 4466->4465 4620 403854 4467->4620 4468->4467 4474 4057ca 4473->4474 4475 40364d ExitProcess 4474->4475 4476 4057de MessageBoxIndirectA 4474->4476 4476->4475 4478 40369c 4477->4478 4479 4056d7 GetLastError 4477->4479 4478->4314 4479->4478 4480 4056e6 SetFileSecurityA 4479->4480 4480->4478 4481 4056fc GetLastError 4480->4481 4481->4478 4483 405713 4482->4483 4484 405717 GetLastError 4482->4484 4483->4314 4484->4483 4485->4316 4487 4032fa 4486->4487 4488 405a4b lstrcatA 4486->4488 4487->4346 4488->4487 4489->4352 4490->4354 4492 405a85 4491->4492 4493 402e04 4492->4493 4494 405a8a CharPrevA 4492->4494 4495 406099 lstrcpynA 4493->4495 4494->4492 4494->4493 4495->4358 4497 402d07 4496->4497 4498 402d1f 4496->4498 4501 402d10 DestroyWindow 4497->4501 4502 402d17 4497->4502 4499 402d27 4498->4499 4500 402d2f GetTickCount 4498->4500 4531 40646d 4499->4531 4500->4502 4504 402d3d 4500->4504 4501->4502 4502->4363 4502->4379 4530 4032c5 SetFilePointer 4502->4530 4505 402d72 CreateDialogParamA ShowWindow 4504->4505 4506 402d45 4504->4506 4505->4502 4506->4502 4535 402cdd 4506->4535 4508 402d53 wsprintfA 4509 4051c0 24 API calls 4508->4509 4510 402d70 4509->4510 4510->4502 4511->4376 4513 403069 4512->4513 4514 40304d SetFilePointer 4512->4514 4538 403146 GetTickCount 4513->4538 4514->4513 4517 405caa ReadFile 4518 403089 4517->4518 4519 403146 42 API calls 4518->4519 4521 403106 4518->4521 4520 4030a0 4519->4520 4520->4521 4522 40310c ReadFile 4520->4522 4524 4030af 4520->4524 4521->4379 4522->4521 4524->4521 4525 405caa ReadFile 4524->4525 4551 405cd9 WriteFile 4524->4551 4525->4524 4528 405caa ReadFile 4527->4528 4529 4032c2 4528->4529 4529->4378 4530->4368 4532 40648a PeekMessageA 4531->4532 4533 406480 DispatchMessageA 4532->4533 4534 40649a 4532->4534 4533->4532 4534->4502 4536 402cec 4535->4536 4537 402cee MulDiv 4535->4537 4536->4537 4537->4508 4539 403174 4538->4539 4540 40329e 4538->4540 4553 4032c5 SetFilePointer 4539->4553 4541 402cf9 32 API calls 4540->4541 4548 403070 4541->4548 4543 40317f SetFilePointer 4547 4031a4 4543->4547 4544 4032af ReadFile 4544->4547 4546 402cf9 32 API calls 4546->4547 4547->4544 4547->4546 4547->4548 4549 405cd9 WriteFile 4547->4549 4550 40327f SetFilePointer 4547->4550 4554 406576 4547->4554 4548->4517 4548->4521 4549->4547 4550->4540 4552 405cf7 4551->4552 4552->4524 4553->4543 4555 4065a3 4554->4555 4556 40659b 4554->4556 4555->4556 4557 406633 GlobalAlloc 4555->4557 4558 40662a GlobalFree 4555->4558 4559 4066a1 GlobalFree 4555->4559 4560 4066aa GlobalAlloc 4555->4560 4556->4547 4557->4555 4557->4556 4558->4557 4559->4560 4560->4555 4560->4556 4562 403bc2 4561->4562 4578 405ff7 wsprintfA 4562->4578 4564 403c33 4565 403c67 18 API calls 4564->4565 4567 403c38 4565->4567 4566 40396e 4566->4393 4567->4566 4568 4060bb 17 API calls 4567->4568 4568->4567 4570 4041a6 SendMessageA 4569->4570 4573 4052b5 4570->4573 4571 4041a6 SendMessageA 4572 4052ee OleUninitialize 4571->4572 4572->4425 4574 401389 2 API calls 4573->4574 4575 4052dc 4573->4575 4574->4573 4575->4571 4576->4389 4577->4395 4578->4564 4580 405d54 GetShortPathNameA 4579->4580 4581 405d2e 4579->4581 4583 405e73 4580->4583 4584 405d69 4580->4584 4606 405c32 GetFileAttributesA CreateFileA 4581->4606 4583->4443 4584->4583 4586 405d71 wsprintfA 4584->4586 4585 405d38 CloseHandle GetShortPathNameA 4585->4583 4587 405d4c 4585->4587 4588 4060bb 17 API calls 4586->4588 4587->4580 4587->4583 4589 405d99 4588->4589 4607 405c32 GetFileAttributesA CreateFileA 4589->4607 4591 405da6 4591->4583 4592 405db5 GetFileSize GlobalAlloc 4591->4592 4593 405dd7 4592->4593 4594 405e6c CloseHandle 4592->4594 4595 405caa ReadFile 4593->4595 4594->4583 4596 405ddf 4595->4596 4596->4594 4608 405b97 lstrlenA 4596->4608 4599 405df6 lstrcpyA 4602 405e18 4599->4602 4600 405e0a 4601 405b97 4 API calls 4600->4601 4601->4602 4603 405e4f SetFilePointer 4602->4603 4604 405cd9 WriteFile 4603->4604 4605 405e65 GlobalFree 4604->4605 4605->4594 4606->4585 4607->4591 4609 405bd8 lstrlenA 4608->4609 4610 405be0 4609->4610 4611 405bb1 lstrcmpiA 4609->4611 4610->4599 4610->4600 4611->4610 4612 405bcf CharNextA 4611->4612 4612->4609 4613->4450 4615 405ae5 4614->4615 4617 405af5 4614->4617 4616 405af0 CharNextA 4615->4616 4615->4617 4619 405b15 4616->4619 4618 405a5c CharNextA 4617->4618 4617->4619 4618->4617 4619->4453 4619->4454 4621 403862 4620->4621 4622 40382b 4621->4622 4623 403867 FreeLibrary GlobalFree 4621->4623 4624 405861 4622->4624 4623->4622 4623->4623 4625 405b1f 18 API calls 4624->4625 4626 405881 4625->4626 4627 4058a0 4626->4627 4628 405889 DeleteFileA 4626->4628 4630 4059ce 4627->4630 4664 406099 lstrcpynA 4627->4664 4629 40362e OleUninitialize 4628->4629 4629->4283 4629->4284 4630->4629 4637 40639c 2 API calls 4630->4637 4632 4058c6 4633 4058d9 4632->4633 4634 4058cc lstrcatA 4632->4634 4636 405a78 2 API calls 4633->4636 4635 4058df 4634->4635 4639 4058ed lstrcatA 4635->4639 4641 4058f8 lstrlenA FindFirstFileA 4635->4641 4636->4635 4638 4059f2 4637->4638 4638->4629 4640 4059f6 4638->4640 4639->4641 4642 405a31 3 API calls 4640->4642 4641->4630 4647 40591c 4641->4647 4643 4059fc 4642->4643 4645 405819 5 API calls 4643->4645 4644 405a5c CharNextA 4644->4647 4646 405a08 4645->4646 4648 405a22 4646->4648 4649 405a0c 4646->4649 4647->4644 4650 4059ad FindNextFileA 4647->4650 4656 40596e 4647->4656 4665 406099 lstrcpynA 4647->4665 4652 4051c0 24 API calls 4648->4652 4649->4629 4654 4051c0 24 API calls 4649->4654 4650->4647 4653 4059c5 FindClose 4650->4653 4652->4629 4653->4630 4655 405a19 4654->4655 4657 405e78 36 API calls 4655->4657 4656->4650 4659 405861 60 API calls 4656->4659 4661 4051c0 24 API calls 4656->4661 4662 4051c0 24 API calls 4656->4662 4663 405e78 36 API calls 4656->4663 4666 405819 4656->4666 4660 405a20 4657->4660 4659->4656 4660->4629 4661->4650 4662->4656 4663->4656 4664->4632 4665->4647 4674 405c0d GetFileAttributesA 4666->4674 4669 405846 4669->4656 4670 405834 RemoveDirectoryA 4672 405842 4670->4672 4671 40583c DeleteFileA 4671->4672 4672->4669 4673 405852 SetFileAttributesA 4672->4673 4673->4669 4675 405825 4674->4675 4676 405c1f SetFileAttributesA 4674->4676 4675->4669 4675->4670 4675->4671 4676->4675 5510 401490 5511 4051c0 24 API calls 5510->5511 5512 401497 5511->5512 5513 401d95 GetDC 5514 402a9f 17 API calls 5513->5514 5515 401da7 GetDeviceCaps MulDiv ReleaseDC 5514->5515 5516 402a9f 17 API calls 5515->5516 5517 401dd8 5516->5517 5518 4060bb 17 API calls 5517->5518 5519 401e15 CreateFontIndirectA 5518->5519 5520 402577 5519->5520 5528 10001058 5530 10001074 5528->5530 5529 100010dc 5530->5529 5531 100014bb GlobalFree 5530->5531 5532 10001091 5530->5532 5531->5532 5533 100014bb GlobalFree 5532->5533 5534 100010a1 5533->5534 5535 100010b1 5534->5535 5536 100010a8 GlobalSize 5534->5536 5537 100010b5 GlobalAlloc 5535->5537 5538 100010c6 5535->5538 5536->5535 5539 100014e2 3 API calls 5537->5539 5540 100010d1 GlobalFree 5538->5540 5539->5538 5540->5529 5541 401d1a 5542 402a9f 17 API calls 5541->5542 5543 401d28 SetWindowLongA 5542->5543 5544 402951 5543->5544 5545 40491b 5546 404947 5545->5546 5547 40492b 5545->5547 5548 40497a 5546->5548 5549 40494d SHGetPathFromIDListA 5546->5549 5556 405799 GetDlgItemTextA 5547->5556 5551 404964 SendMessageA 5549->5551 5552 40495d 5549->5552 5551->5548 5554 40140b 2 API calls 5552->5554 5553 404938 SendMessageA 5553->5546 5554->5551 5556->5553 4749 40159d 4750 402ac1 17 API calls 4749->4750 4751 4015a4 SetFileAttributesA 4750->4751 4752 4015b6 4751->4752 5562 40149d 5563 4022e1 5562->5563 5564 4014ab PostQuitMessage 5562->5564 5564->5563 5565 401a1e 5566 402ac1 17 API calls 5565->5566 5567 401a27 ExpandEnvironmentStringsA 5566->5567 5568 401a3b 5567->5568 5570 401a4e 5567->5570 5569 401a40 lstrcmpA 5568->5569 5568->5570 5569->5570 5571 40171f 5572 402ac1 17 API calls 5571->5572 5573 401726 SearchPathA 5572->5573 5574 401741 5573->5574 5575 100010e0 5578 1000110e 5575->5578 5576 100011c4 GlobalFree 5577 100012ad 2 API calls 5577->5578 5578->5576 5578->5577 5579 100011c3 5578->5579 5580 100011ea GlobalFree 5578->5580 5581 10001266 2 API calls 5578->5581 5582 10001155 GlobalAlloc 5578->5582 5583 100012d1 lstrcpyA 5578->5583 5584 100011b1 GlobalFree 5578->5584 5579->5576 5580->5578 5581->5584 5582->5578 5583->5578 5584->5578 5585 10002162 5586 100021c0 5585->5586 5588 100021f6 5585->5588 5587 100021d2 GlobalAlloc 5586->5587 5586->5588 5587->5586 4770 4042a3 4771 4043c5 4770->4771 4772 4042b9 4770->4772 4773 404434 4771->4773 4778 4044fe 4771->4778 4782 404409 GetDlgItem SendMessageA 4771->4782 4776 40415a 18 API calls 4772->4776 4775 40443e GetDlgItem 4773->4775 4773->4778 4777 4044bc 4775->4777 4781 404454 4775->4781 4779 40430f 4776->4779 4777->4778 4787 4044ce 4777->4787 4780 4041c1 8 API calls 4778->4780 4783 40415a 18 API calls 4779->4783 4785 4044f9 4780->4785 4781->4777 4786 40447a SendMessageA LoadCursorA SetCursor 4781->4786 4807 40417c KiUserCallbackDispatcher 4782->4807 4784 40431c CheckDlgButton 4783->4784 4805 40417c KiUserCallbackDispatcher 4784->4805 4802 404547 4786->4802 4791 4044d4 SendMessageA 4787->4791 4792 4044e5 4787->4792 4791->4792 4792->4785 4796 4044eb SendMessageA 4792->4796 4793 40442f 4808 404523 4793->4808 4794 40433a GetDlgItem 4806 40418f SendMessageA 4794->4806 4796->4785 4799 404350 SendMessageA 4800 404377 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4799->4800 4801 40436e GetSysColor 4799->4801 4800->4785 4801->4800 4811 40577b ShellExecuteExA 4802->4811 4804 4044ad LoadCursorA SetCursor 4804->4777 4805->4794 4806->4799 4807->4793 4809 404531 4808->4809 4810 404536 SendMessageA 4808->4810 4809->4810 4810->4773 4811->4804 4812 401e25 4813 402a9f 17 API calls 4812->4813 4814 401e2b 4813->4814 4815 402a9f 17 API calls 4814->4815 4816 401e37 4815->4816 4817 401e43 ShowWindow 4816->4817 4818 401e4e EnableWindow 4816->4818 4819 402951 4817->4819 4818->4819 5589 406725 5590 4065a9 5589->5590 5591 406f14 5590->5591 5592 406633 GlobalAlloc 5590->5592 5593 40662a GlobalFree 5590->5593 5594 4066a1 GlobalFree 5590->5594 5595 4066aa GlobalAlloc 5590->5595 5592->5590 5592->5591 5593->5592 5594->5595 5595->5590 5595->5591 5596 4064a6 WaitForSingleObject 5597 4064c0 5596->5597 5598 4064d2 GetExitCodeProcess 5597->5598 5599 40646d 2 API calls 5597->5599 5600 4064c7 WaitForSingleObject 5599->5600 5600->5597 5601 4038a7 5602 4038b2 5601->5602 5603 4038b9 GlobalAlloc 5602->5603 5604 4038b6 5602->5604 5603->5604 5605 401f2b 5606 402ac1 17 API calls 5605->5606 5607 401f32 5606->5607 5608 40639c 2 API calls 5607->5608 5609 401f38 5608->5609 5611 401f4a 5609->5611 5612 405ff7 wsprintfA 5609->5612 5612->5611 5613 40292c SendMessageA 5614 402951 5613->5614 5615 402946 InvalidateRect 5613->5615 5615->5614 5623 4026b4 5624 4026ba 5623->5624 5625 402951 5624->5625 5626 4026c2 FindClose 5624->5626 5626->5625 5627 405134 5628 405144 5627->5628 5629 405158 5627->5629 5630 4051a1 5628->5630 5631 40514a 5628->5631 5632 405160 IsWindowVisible 5629->5632 5638 405177 5629->5638 5633 4051a6 CallWindowProcA 5630->5633 5634 4041a6 SendMessageA 5631->5634 5632->5630 5635 40516d 5632->5635 5636 405154 5633->5636 5634->5636 5640 404a8b SendMessageA 5635->5640 5638->5633 5645 404b0b 5638->5645 5641 404aea SendMessageA 5640->5641 5642 404aae GetMessagePos ScreenToClient SendMessageA 5640->5642 5643 404ae2 5641->5643 5642->5643 5644 404ae7 5642->5644 5643->5638 5644->5641 5654 406099 lstrcpynA 5645->5654 5647 404b1e 5655 405ff7 wsprintfA 5647->5655 5649 404b28 5650 40140b 2 API calls 5649->5650 5651 404b31 5650->5651 5656 406099 lstrcpynA 5651->5656 5653 404b38 5653->5630 5654->5647 5655->5649 5656->5653 5657 402736 5658 402ac1 17 API calls 5657->5658 5659 402744 5658->5659 5660 40275a 5659->5660 5661 402ac1 17 API calls 5659->5661 5662 405c0d 2 API calls 5660->5662 5661->5660 5663 402760 5662->5663 5685 405c32 GetFileAttributesA CreateFileA 5663->5685 5665 40276d 5666 402816 5665->5666 5667 402779 GlobalAlloc 5665->5667 5670 402831 5666->5670 5671 40281e DeleteFileA 5666->5671 5668 402792 5667->5668 5669 40280d CloseHandle 5667->5669 5686 4032c5 SetFilePointer 5668->5686 5669->5666 5671->5670 5673 402798 5674 4032af ReadFile 5673->5674 5675 4027a1 GlobalAlloc 5674->5675 5676 4027b1 5675->5676 5677 4027eb 5675->5677 5678 40303e 44 API calls 5676->5678 5679 405cd9 WriteFile 5677->5679 5684 4027be 5678->5684 5680 4027f7 GlobalFree 5679->5680 5681 40303e 44 API calls 5680->5681 5682 40280a 5681->5682 5682->5669 5683 4027e2 GlobalFree 5683->5677 5684->5683 5685->5665 5686->5673 5687 4014b7 5688 4014bd 5687->5688 5689 401389 2 API calls 5688->5689 5690 4014c5 5689->5690 5691 401b39 5692 402ac1 17 API calls 5691->5692 5693 401b40 5692->5693 5694 402a9f 17 API calls 5693->5694 5695 401b49 wsprintfA 5694->5695 5696 402951 5695->5696 4853 40233a 4854 402ac1 17 API calls 4853->4854 4855 40234b 4854->4855 4856 402ac1 17 API calls 4855->4856 4857 402354 4856->4857 4858 402ac1 17 API calls 4857->4858 4859 40235e GetPrivateProfileStringA 4858->4859 4889 4015bb 4890 402ac1 17 API calls 4889->4890 4891 4015c2 4890->4891 4892 405aca 4 API calls 4891->4892 4904 4015ca 4892->4904 4893 401624 4895 401652 4893->4895 4896 401629 4893->4896 4894 405a5c CharNextA 4894->4904 4899 401423 24 API calls 4895->4899 4897 401423 24 API calls 4896->4897 4898 401630 4897->4898 4908 406099 lstrcpynA 4898->4908 4905 40164a 4899->4905 4901 405703 2 API calls 4901->4904 4902 405720 5 API calls 4902->4904 4903 40163b SetCurrentDirectoryA 4903->4905 4904->4893 4904->4894 4904->4901 4904->4902 4906 40160c GetFileAttributesA 4904->4906 4907 405686 4 API calls 4904->4907 4906->4904 4907->4904 4908->4903 5697 4016bb 5698 402ac1 17 API calls 5697->5698 5699 4016c1 GetFullPathNameA 5698->5699 5700 4016d8 5699->5700 5706 4016f9 5699->5706 5703 40639c 2 API calls 5700->5703 5700->5706 5701 402951 5702 40170d GetShortPathNameA 5702->5701 5704 4016e9 5703->5704 5704->5706 5707 406099 lstrcpynA 5704->5707 5706->5701 5706->5702 5707->5706 5708 401d3b GetDlgItem GetClientRect 5709 402ac1 17 API calls 5708->5709 5710 401d6b LoadImageA SendMessageA 5709->5710 5711 402951 5710->5711 5712 401d89 DeleteObject 5710->5712 5712->5711 5713 404b3d GetDlgItem GetDlgItem 5714 404b8f 7 API calls 5713->5714 5721 404da7 5713->5721 5715 404c32 DeleteObject 5714->5715 5716 404c25 SendMessageA 5714->5716 5717 404c3b 5715->5717 5716->5715 5719 404c72 5717->5719 5720 4060bb 17 API calls 5717->5720 5718 404e8b 5723 404f37 5718->5723 5728 404d9a 5718->5728 5729 404ee4 SendMessageA 5718->5729 5722 40415a 18 API calls 5719->5722 5724 404c54 SendMessageA SendMessageA 5720->5724 5721->5718 5732 404a8b 5 API calls 5721->5732 5749 404e18 5721->5749 5727 404c86 5722->5727 5725 404f41 SendMessageA 5723->5725 5726 404f49 5723->5726 5724->5717 5725->5726 5737 404f62 5726->5737 5738 404f5b ImageList_Destroy 5726->5738 5742 404f72 5726->5742 5733 40415a 18 API calls 5727->5733 5730 4041c1 8 API calls 5728->5730 5729->5728 5735 404ef9 SendMessageA 5729->5735 5736 40512d 5730->5736 5731 404e7d SendMessageA 5731->5718 5732->5749 5745 404c94 5733->5745 5734 4050e1 5734->5728 5743 4050f3 ShowWindow GetDlgItem ShowWindow 5734->5743 5739 404f0c 5735->5739 5740 404f6b GlobalFree 5737->5740 5737->5742 5738->5737 5751 404f1d SendMessageA 5739->5751 5740->5742 5741 404d68 GetWindowLongA SetWindowLongA 5744 404d81 5741->5744 5742->5734 5746 404fad 5742->5746 5758 404b0b 4 API calls 5742->5758 5743->5728 5747 404d87 ShowWindow 5744->5747 5748 404d9f 5744->5748 5745->5741 5750 404ce3 SendMessageA 5745->5750 5752 404d62 5745->5752 5756 404d30 SendMessageA 5745->5756 5757 404d1f SendMessageA 5745->5757 5753 404ff1 5746->5753 5761 404fdb SendMessageA 5746->5761 5764 40418f SendMessageA 5747->5764 5765 40418f SendMessageA 5748->5765 5749->5718 5749->5731 5750->5745 5751->5723 5752->5741 5752->5744 5759 4050b7 InvalidateRect 5753->5759 5763 405065 SendMessageA SendMessageA 5753->5763 5756->5745 5757->5745 5758->5746 5759->5734 5760 4050cd 5759->5760 5762 404a46 20 API calls 5760->5762 5761->5753 5762->5734 5763->5753 5764->5728 5765->5721

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 40330d-40334c SetErrorMode GetVersion 1 40334e-403356 call 406431 0->1 2 40335f 0->2 1->2 7 403358 1->7 4 403364-403377 call 4063c3 lstrlenA 2->4 9 403379-403395 call 406431 * 3 4->9 7->2 16 4033a6-403406 #17 OleInitialize SHGetFileInfoA call 406099 GetCommandLineA call 406099 GetModuleHandleA 9->16 17 403397-40339d 9->17 24 403412-403427 call 405a5c CharNextA 16->24 25 403408-40340d 16->25 17->16 21 40339f 17->21 21->16 28 4034ec-4034f0 24->28 25->24 29 4034f6 28->29 30 40342c-40342f 28->30 33 403509-403523 GetTempPathA call 4032dc 29->33 31 403431-403435 30->31 32 403437-40343f 30->32 31->31 31->32 34 403441-403442 32->34 35 403447-40344a 32->35 43 403525-403543 GetWindowsDirectoryA lstrcatA call 4032dc 33->43 44 40357b-403595 DeleteFileA call 402d98 33->44 34->35 37 403450-403454 35->37 38 4034dc-4034e9 call 405a5c 35->38 41 403456-40345c 37->41 42 40346c-403499 37->42 38->28 53 4034eb 38->53 47 403462 41->47 48 40345e-403460 41->48 49 40349b-4034a1 42->49 50 4034ac-4034da 42->50 43->44 61 403545-403575 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032dc 43->61 58 403629-403639 call 4037f7 OleUninitialize 44->58 59 40359b-4035a1 44->59 47->42 48->42 48->47 55 4034a3-4034a5 49->55 56 4034a7 49->56 50->38 52 4034f8-403504 call 406099 50->52 52->33 53->28 55->50 55->56 56->50 72 40375d-403763 58->72 73 40363f-40364f call 4057b5 ExitProcess 58->73 63 4035a3-4035ae call 405a5c 59->63 64 403619-403620 call 4038e9 59->64 61->44 61->58 76 4035b0-4035d9 63->76 77 4035e4-4035ee 63->77 70 403625 64->70 70->58 74 403765-40377e GetCurrentProcess OpenProcessToken 72->74 75 4037df-4037e7 72->75 79 4037b0-4037be call 406431 74->79 80 403780-4037aa LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4037e9 75->82 83 4037ed-4037f1 ExitProcess 75->83 81 4035db-4035dd 76->81 84 4035f0-4035fd call 405b1f 77->84 85 403655-403669 call 405720 lstrcatA 77->85 97 4037c0-4037ca 79->97 98 4037cc-4037d6 ExitWindowsEx 79->98 80->79 81->77 88 4035df-4035e2 81->88 82->83 84->58 94 4035ff-403615 call 406099 * 2 84->94 95 403676-403690 lstrcatA lstrcmpiA 85->95 96 40366b-403671 lstrcatA 85->96 88->77 88->81 94->64 95->58 100 403692-403695 95->100 96->95 97->98 101 4037d8-4037da call 40140b 97->101 98->75 98->101 103 403697-40369c call 405686 100->103 104 40369e call 405703 100->104 101->75 112 4036a3-4036b0 SetCurrentDirectoryA 103->112 104->112 113 4036b2-4036b8 call 406099 112->113 114 4036bd-4036e5 call 406099 112->114 113->114 118 4036eb-403707 call 4060bb DeleteFileA 114->118 121 403748-40374f 118->121 122 403709-403719 CopyFileA 118->122 121->118 124 403751-403758 call 405e78 121->124 122->121 123 40371b-403734 call 405e78 call 4060bb call 405738 122->123 132 403739-40373b 123->132 124->58 132->121 133 40373d-403744 CloseHandle 132->133 133->121
                            APIs
                            • SetErrorMode.KERNELBASE ref: 00403332
                            • GetVersion.KERNEL32 ref: 00403338
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033A7
                            • OleInitialize.OLE32(00000000), ref: 004033AE
                            • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033CA
                            • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033DF
                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",00000000,?,00000006,00000008,0000000A), ref: 004033F2
                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",00000020,?,00000006,00000008,0000000A), ref: 0040341D
                            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040351A
                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 0040352B
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403537
                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040354B
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403553
                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403564
                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040356C
                            • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403580
                              • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              • Part of subcall function 004038E9: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75D83410), ref: 004039D9
                              • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                              • Part of subcall function 004038E9: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing), ref: 00403A40
                              • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002C4,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                              • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002A8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                            • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040362E
                            • ExitProcess.KERNEL32 ref: 0040364F
                            • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040376C
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                            • ExitProcess.KERNEL32 ref: 004037F1
                              • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                            • String ID: "$"C:\Users\user\Desktop\aMfizaMilo.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\aMfizaMilo.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3704715180-3188226241
                            • Opcode ID: 6fb2701c2198554de983d489162d70f6248e26c12371a32bdff927a978f2d77a
                            • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                            • Opcode Fuzzy Hash: 6fb2701c2198554de983d489162d70f6248e26c12371a32bdff927a978f2d77a
                            • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 134 4052fe-40531a 135 405320-4053e7 GetDlgItem * 3 call 40418f call 404a5e GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4054a9-4054af 134->136 158 405405-405408 135->158 159 4053e9-405403 SendMessageA * 2 135->159 138 4054b1-4054d3 GetDlgItem CreateThread FindCloseChangeNotification 136->138 139 4054d9-4054e5 136->139 138->139 141 405507-40550d 139->141 142 4054e7-4054ed 139->142 143 405562-405565 141->143 144 40550f-405515 141->144 146 405528-40552f call 4041c1 142->146 147 4054ef-405502 ShowWindow * 2 call 40418f 142->147 143->146 152 405567-40556d 143->152 148 405517-405523 call 404133 144->148 149 40553b-40554b ShowWindow 144->149 155 405534-405538 146->155 147->141 148->146 156 40555b-40555d call 404133 149->156 157 40554d-405556 call 4051c0 149->157 152->146 160 40556f-405582 SendMessageA 152->160 156->143 157->156 163 405418-40542f call 40415a 158->163 164 40540a-405416 SendMessageA 158->164 159->158 165 405588-4055b4 CreatePopupMenu call 4060bb AppendMenuA 160->165 166 40567f-405681 160->166 173 405431-405445 ShowWindow 163->173 174 405465-405486 GetDlgItem SendMessageA 163->174 164->163 171 4055b6-4055c6 GetWindowRect 165->171 172 4055c9-4055df TrackPopupMenu 165->172 166->155 171->172 172->166 175 4055e5-4055ff 172->175 176 405454 173->176 177 405447-405452 ShowWindow 173->177 174->166 178 40548c-4054a4 SendMessageA * 2 174->178 179 405604-40561f SendMessageA 175->179 180 40545a-405460 call 40418f 176->180 177->180 178->166 179->179 181 405621-405641 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 405643-405663 SendMessageA 181->183 183->183 184 405665-405679 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->166
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 0040535D
                            • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                            • GetClientRect.USER32(?,?), ref: 004053A9
                            • GetSystemMetrics.USER32(00000002), ref: 004053B0
                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                            • ShowWindow.USER32(?,00000008), ref: 0040544C
                            • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                            • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                              • Part of subcall function 0040418F: SendMessageA.USER32(00000028,?,?,00403FBF), ref: 0040419D
                            • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                            • CreateThread.KERNELBASE(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054D3
                            • ShowWindow.USER32(00000000), ref: 004054F6
                            • ShowWindow.USER32(?,00000008), ref: 004054FD
                            • ShowWindow.USER32(00000008), ref: 00405543
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                            • CreatePopupMenu.USER32 ref: 00405588
                            • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 0040559D
                            • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055D6
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                            • OpenClipboard.USER32(00000000), ref: 00405622
                            • EmptyClipboard.USER32 ref: 00405628
                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                            • GlobalLock.KERNEL32(00000000), ref: 0040563B
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                            • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                            • SetClipboardData.USER32(?,00000000), ref: 00405673
                            • CloseClipboard.USER32 ref: 00405679
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                            • String ID: 0B
                            • API String ID: 4154960007-4132856435
                            • Opcode ID: 4ae86a2eb0e764239c625fe7474c6516e4a04bb5ce475004cf9a6bce91262fda
                            • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                            • Opcode Fuzzy Hash: 4ae86a2eb0e764239c625fe7474c6516e4a04bb5ce475004cf9a6bce91262fda
                            • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 497 405861-405887 call 405b1f 500 4058a0-4058a7 497->500 501 405889-40589b DeleteFileA 497->501 503 4058a9-4058ab 500->503 504 4058ba-4058ca call 406099 500->504 502 405a2a-405a2e 501->502 505 4058b1-4058b4 503->505 506 4059d8-4059dd 503->506 510 4058d9-4058da call 405a78 504->510 511 4058cc-4058d7 lstrcatA 504->511 505->504 505->506 506->502 509 4059df-4059e2 506->509 512 4059e4-4059ea 509->512 513 4059ec-4059f4 call 40639c 509->513 514 4058df-4058e2 510->514 511->514 512->502 513->502 520 4059f6-405a0a call 405a31 call 405819 513->520 518 4058e4-4058eb 514->518 519 4058ed-4058f3 lstrcatA 514->519 518->519 521 4058f8-405916 lstrlenA FindFirstFileA 518->521 519->521 535 405a22-405a25 call 4051c0 520->535 536 405a0c-405a0f 520->536 523 40591c-405933 call 405a5c 521->523 524 4059ce-4059d2 521->524 531 405935-405939 523->531 532 40593e-405941 523->532 524->506 526 4059d4 524->526 526->506 531->532 537 40593b 531->537 533 405943-405948 532->533 534 405954-405962 call 406099 532->534 538 40594a-40594c 533->538 539 4059ad-4059bf FindNextFileA 533->539 547 405964-40596c 534->547 548 405979-405984 call 405819 534->548 535->502 536->512 541 405a11-405a20 call 4051c0 call 405e78 536->541 537->532 538->534 543 40594e-405952 538->543 539->523 545 4059c5-4059c8 FindClose 539->545 541->502 543->534 543->539 545->524 547->539 550 40596e-405977 call 405861 547->550 557 4059a5-4059a8 call 4051c0 548->557 558 405986-405989 548->558 550->539 557->539 560 40598b-40599b call 4051c0 call 405e78 558->560 561 40599d-4059a3 558->561 560->539 561->539
                            APIs
                            • DeleteFileA.KERNELBASE(?,?,75D83410,75D82EE0,00000000), ref: 0040588A
                            • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 004058D2
                            • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 004058F3
                            • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 004058F9
                            • FindFirstFileA.KERNELBASE(00421D38,?,?,?,0040A014,?,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 0040590A
                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                            • FindClose.KERNEL32(00000000), ref: 004059C8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$\*.*
                            • API String ID: 2035342205-1017082723
                            • Opcode ID: 83b5a4a5d0d8edda3f8e0557dfde68d1d2535845567fb2c63194c6eb2875a849
                            • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                            • Opcode Fuzzy Hash: 83b5a4a5d0d8edda3f8e0557dfde68d1d2535845567fb2c63194c6eb2875a849
                            • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E
                            APIs
                            • CoCreateInstance.OLE32(00408408,?,?,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214D
                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021FC
                            Strings
                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers, xrefs: 0040218D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ByteCharCreateInstanceMultiWide
                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers
                            • API String ID: 123533781-4084520710
                            • Opcode ID: 1de0a6610444ccfce012cd9757aba54bd57a6ab52e750509d87dd78bfa4fca60
                            • Instruction ID: a4a7f3c5621d46c7608b395b9069b641d7403675325c7ae40bb0e4cab6624151
                            • Opcode Fuzzy Hash: 1de0a6610444ccfce012cd9757aba54bd57a6ab52e750509d87dd78bfa4fca60
                            • Instruction Fuzzy Hash: 89512475A00208BFCF10DFE4C988A9DBBB5EF88314F2045AAF915EB2D1DA799941CF54
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                            • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                            • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                            • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                            APIs
                            • FindFirstFileA.KERNELBASE(75D83410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0), ref: 004063A7
                            • FindClose.KERNELBASE(00000000), ref: 004063B3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID: C:\
                            • API String ID: 2295610775-3404278061
                            • Opcode ID: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                            • Instruction ID: 7ad18ffb452888df832aaad39da4d842c40e8f76539fb63f13b43eacc156c169
                            • Opcode Fuzzy Hash: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                            • Instruction Fuzzy Hash: 7CD012316050306BC20117386E0C84B7A5C9F053307119B37F9A6F12E0D7748CB286DD
                            APIs
                            • GetTickCount.KERNEL32 ref: 0040315A
                              • Part of subcall function 004032C5: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 0040318D
                            • SetFilePointer.KERNELBASE(004FF04F,00000000,00000000,004138D8,00004000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000), ref: 00403288
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FilePointer$CountTick
                            • String ID:
                            • API String ID: 1092082344-0
                            • Opcode ID: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                            • Instruction ID: 532adb213c64d5ab3b143d976f528210e7f95c922d5c949e36f01b9cb200fd6d
                            • Opcode Fuzzy Hash: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                            • Instruction Fuzzy Hash: FD3160726442049FD710AF6AFE4896A3BECF75435A710827FE904B22F0DB389941DB9D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 185 403c86-403c98 186 403dd9-403de8 185->186 187 403c9e-403ca4 185->187 189 403e37-403e4c 186->189 190 403dea-403e32 GetDlgItem * 2 call 40415a SetClassLongA call 40140b 186->190 187->186 188 403caa-403cb3 187->188 193 403cb5-403cc2 SetWindowPos 188->193 194 403cc8-403ccb 188->194 191 403e8c-403e91 call 4041a6 189->191 192 403e4e-403e51 189->192 190->189 204 403e96-403eb1 191->204 196 403e53-403e5e call 401389 192->196 197 403e84-403e86 192->197 193->194 199 403ce5-403ceb 194->199 200 403ccd-403cdf ShowWindow 194->200 196->197 218 403e60-403e7f SendMessageA 196->218 197->191 203 404127 197->203 205 403d07-403d0a 199->205 206 403ced-403d02 DestroyWindow 199->206 200->199 213 404129-404130 203->213 211 403eb3-403eb5 call 40140b 204->211 212 403eba-403ec0 204->212 208 403d0c-403d18 SetWindowLongA 205->208 209 403d1d-403d23 205->209 214 404104-40410a 206->214 208->213 216 403dc6-403dd4 call 4041c1 209->216 217 403d29-403d3a GetDlgItem 209->217 211->212 221 4040e5-4040fe DestroyWindow EndDialog 212->221 222 403ec6-403ed1 212->222 214->203 220 40410c-404112 214->220 216->213 223 403d59-403d5c 217->223 224 403d3c-403d53 SendMessageA IsWindowEnabled 217->224 218->213 220->203 226 404114-40411d ShowWindow 220->226 221->214 222->221 227 403ed7-403f24 call 4060bb call 40415a * 3 GetDlgItem 222->227 228 403d61-403d64 223->228 229 403d5e-403d5f 223->229 224->203 224->223 226->203 255 403f26-403f2b 227->255 256 403f2e-403f6a ShowWindow KiUserCallbackDispatcher call 40417c EnableWindow 227->256 234 403d72-403d77 228->234 235 403d66-403d6c 228->235 233 403d8f-403d94 call 404133 229->233 233->216 238 403dad-403dc0 SendMessageA 234->238 240 403d79-403d7f 234->240 235->238 239 403d6e-403d70 235->239 238->216 239->233 243 403d81-403d87 call 40140b 240->243 244 403d96-403d9f call 40140b 240->244 253 403d8d 243->253 244->216 252 403da1-403dab 244->252 252->253 253->233 255->256 259 403f6c-403f6d 256->259 260 403f6f 256->260 261 403f71-403f9f GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403fa1-403fb2 SendMessageA 261->262 263 403fb4 261->263 264 403fba-403ff4 call 40418f call 403c67 call 406099 lstrlenA call 4060bb SetWindowTextA call 401389 262->264 263->264 264->204 275 403ffa-403ffc 264->275 275->204 276 404002-404006 275->276 277 404025-404039 DestroyWindow 276->277 278 404008-40400e 276->278 277->214 279 40403f-40406c CreateDialogParamA 277->279 278->203 280 404014-40401a 278->280 279->214 281 404072-4040c9 call 40415a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->204 282 404020 280->282 281->203 287 4040cb-4040de ShowWindow call 4041a6 281->287 282->203 289 4040e3 287->289 289->214
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                            • ShowWindow.USER32(?), ref: 00403CDF
                            • DestroyWindow.USER32 ref: 00403CF3
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                            • GetDlgItem.USER32(?,?), ref: 00403D30
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                            • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                            • GetDlgItem.USER32(?,?), ref: 00403DF9
                            • GetDlgItem.USER32(?,00000002), ref: 00403E03
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                            • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403E6E
                            • GetDlgItem.USER32(?,00000003), ref: 00403F14
                            • ShowWindow.USER32(00000000,?), ref: 00403F35
                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F47
                            • EnableWindow.USER32(?,?), ref: 00403F62
                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F78
                            • EnableMenuItem.USER32(00000000), ref: 00403F7F
                            • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403F97
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                            • lstrlenA.KERNEL32(symphonized: Installing,?,symphonized: Installing,00000000), ref: 00403FD4
                            • SetWindowTextA.USER32(?,symphonized: Installing), ref: 00403FE3
                            • ShowWindow.USER32(?,0000000A), ref: 00404117
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                            • String ID: symphonized: Installing
                            • API String ID: 3282139019-1948955388
                            • Opcode ID: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                            • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                            • Opcode Fuzzy Hash: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                            • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 290 4038e9-403901 call 406431 293 403903-403913 call 405ff7 290->293 294 403915-403946 call 405f80 290->294 303 403969-403992 call 403bae call 405b1f 293->303 299 403948-403959 call 405f80 294->299 300 40395e-403964 lstrcatA 294->300 299->300 300->303 308 403998-40399d 303->308 309 403a19-403a21 call 405b1f 303->309 308->309 310 40399f-4039c3 call 405f80 308->310 315 403a23-403a2a call 4060bb 309->315 316 403a2f-403a54 LoadImageA 309->316 310->309 317 4039c5-4039c7 310->317 315->316 319 403ad5-403add call 40140b 316->319 320 403a56-403a86 RegisterClassA 316->320 321 4039d8-4039e4 lstrlenA 317->321 322 4039c9-4039d6 call 405a5c 317->322 333 403ae7-403af2 call 403bae 319->333 334 403adf-403ae2 319->334 323 403ba4 320->323 324 403a8c-403ad0 SystemParametersInfoA CreateWindowExA 320->324 328 4039e6-4039f4 lstrcmpiA 321->328 329 403a0c-403a14 call 405a31 call 406099 321->329 322->321 327 403ba6-403bad 323->327 324->319 328->329 332 4039f6-403a00 GetFileAttributesA 328->332 329->309 336 403a02-403a04 332->336 337 403a06-403a07 call 405a78 332->337 343 403af8-403b12 ShowWindow call 4063c3 333->343 344 403b7b-403b7c call 405292 333->344 334->327 336->329 336->337 337->329 349 403b14-403b19 call 4063c3 343->349 350 403b1e-403b30 GetClassInfoA 343->350 348 403b81-403b83 344->348 351 403b85-403b8b 348->351 352 403b9d-403b9f call 40140b 348->352 349->350 356 403b32-403b42 GetClassInfoA RegisterClassA 350->356 357 403b48-403b6b DialogBoxParamA call 40140b 350->357 351->334 353 403b91-403b98 call 40140b 351->353 352->323 353->334 356->357 361 403b70-403b79 call 403839 357->361 361->327
                            APIs
                              • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                            • lstrcatA.KERNEL32(1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75D83410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\aMfizaMilo.exe",00000000), ref: 00403964
                            • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75D83410), ref: 004039D9
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                            • GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                            • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing), ref: 00403A40
                              • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                            • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A95
                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                            • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                            • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                            • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                            • RegisterClassA.USER32(00423EC0), ref: 00403B42
                            • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$symphonized: Installing
                            • API String ID: 1975747703-4091347693
                            • Opcode ID: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                            • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                            • Opcode Fuzzy Hash: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                            • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 364 402d98-402de6 GetTickCount GetModuleFileNameA call 405c32 367 402df2-402e20 call 406099 call 405a78 call 406099 GetFileSize 364->367 368 402de8-402ded 364->368 376 402f10-402f1e call 402cf9 367->376 377 402e26-402e3d 367->377 369 403037-40303b 368->369 383 402f24-402f27 376->383 384 402fef-402ff4 376->384 378 402e41-402e4e call 4032af 377->378 379 402e3f 377->379 388 402e54-402e5a 378->388 389 402fab-402fb3 call 402cf9 378->389 379->378 386 402f53-402f9f GlobalAlloc call 406556 call 405c61 CreateFileA 383->386 387 402f29-402f41 call 4032c5 call 4032af 383->387 384->369 414 402fa1-402fa6 386->414 415 402fb5-402fe5 call 4032c5 call 40303e 386->415 387->384 412 402f47-402f4d 387->412 392 402eda-402ede 388->392 393 402e5c-402e74 call 405bed 388->393 389->384 396 402ee0-402ee6 call 402cf9 392->396 397 402ee7-402eed 392->397 393->397 411 402e76-402e7d 393->411 396->397 403 402f00-402f0a 397->403 404 402eef-402efd call 4064e8 397->404 403->376 403->377 404->403 411->397 416 402e7f-402e86 411->416 412->384 412->386 414->369 424 402fea-402fed 415->424 416->397 418 402e88-402e8f 416->418 418->397 420 402e91-402e98 418->420 420->397 422 402e9a-402eba 420->422 422->384 423 402ec0-402ec4 422->423 425 402ec6-402eca 423->425 426 402ecc-402ed4 423->426 424->384 427 402ff6-403007 424->427 425->376 425->426 426->397 428 402ed6-402ed8 426->428 429 403009 427->429 430 40300f-403014 427->430 428->397 429->430 431 403015-40301b 430->431 431->431 432 40301d-403035 call 405bed 431->432 432->369
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402DAC
                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\aMfizaMilo.exe,00000400), ref: 00402DC8
                              • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405C36
                              • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                            • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\aMfizaMilo.exe,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00402E11
                            • GlobalAlloc.KERNELBASE(00000040,0040A130), ref: 00402F58
                            Strings
                            • soft, xrefs: 00402E88
                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FA1
                            • C:\Users\user\Desktop\aMfizaMilo.exe, xrefs: 00402DB2, 00402DC1, 00402DD5, 00402DF2
                            • Inst, xrefs: 00402E7F
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FEF
                            • "C:\Users\user\Desktop\aMfizaMilo.exe", xrefs: 00402D98
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DA2, 00402F70
                            • Error launching installer, xrefs: 00402DE8
                            • C:\Users\user\Desktop, xrefs: 00402DF3, 00402DF8, 00402DFE
                            • Null, xrefs: 00402E91
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\aMfizaMilo.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 2803837635-1501597272
                            • Opcode ID: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                            • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                            • Opcode Fuzzy Hash: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                            • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 435 4060bb-4060c6 436 4060c8-4060d7 435->436 437 4060d9-4060ef 435->437 436->437 438 4062e0-4062e4 437->438 439 4060f5-406100 437->439 441 406112-40611c 438->441 442 4062ea-4062f4 438->442 439->438 440 406106-40610d 439->440 440->438 441->442 443 406122-406129 441->443 444 4062f6-4062fa call 406099 442->444 445 4062ff-406300 442->445 446 4062d3 443->446 447 40612f-406163 443->447 444->445 449 4062d5-4062db 446->449 450 4062dd-4062df 446->450 451 406280-406283 447->451 452 406169-406173 447->452 449->438 450->438 455 4062b3-4062b6 451->455 456 406285-406288 451->456 453 406175-406179 452->453 454 40618d 452->454 453->454 459 40617b-40617f 453->459 462 406194-40619b 454->462 457 4062c4-4062d1 lstrlenA 455->457 458 4062b8-4062bf call 4060bb 455->458 460 406298-4062a4 call 406099 456->460 461 40628a-406296 call 405ff7 456->461 457->438 458->457 459->454 464 406181-406185 459->464 471 4062a9-4062af 460->471 461->471 466 4061a0-4061a2 462->466 467 40619d-40619f 462->467 464->454 472 406187-40618b 464->472 469 4061a4-4061bf call 405f80 466->469 470 4061db-4061de 466->470 467->466 478 4061c4-4061c7 469->478 476 4061e0-4061ec GetSystemDirectoryA 470->476 477 4061ee-4061f1 470->477 471->457 475 4062b1 471->475 472->462 479 406278-40627e call 406303 475->479 480 406262-406265 476->480 481 4061f3-406201 GetWindowsDirectoryA 477->481 482 40625e-406260 477->482 483 406267-40626b 478->483 484 4061cd-4061d6 call 4060bb 478->484 479->457 480->479 480->483 481->482 482->480 485 406203-40620d 482->485 483->479 488 40626d-406273 lstrcatA 483->488 484->480 490 406227-40623d SHGetSpecialFolderLocation 485->490 491 40620f-406212 485->491 488->479 492 40625b 490->492 493 40623f-406259 SHGetPathFromIDListA CoTaskMemFree 490->493 491->490 495 406214-40621b 491->495 492->482 493->480 493->492 496 406223-406225 495->496 496->480 496->490
                            APIs
                            • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004061E6
                            • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000), ref: 004061F9
                            • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000), ref: 00406235
                            • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00406243
                            • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                            • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                            • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,00000000), ref: 004062C5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 717251189-3961257149
                            • Opcode ID: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                            • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                            • Opcode Fuzzy Hash: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                            • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E

                            Control-flow Graph

                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers,00000000,00000000,00000031), ref: 00401798
                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers,00000000,00000000,00000031), ref: 004017C2
                              • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                              • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll), ref: 0040522E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers$C:\Users\user\AppData\Local\Temp\nsyFCA.tmp$C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll$Call
                            • API String ID: 1941528284-2101946985
                            • Opcode ID: e928e46396d8dc3c4a4bdb24082dd825f8b0ff1d663bcc8c2bbd70b8c757518f
                            • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                            • Opcode Fuzzy Hash: e928e46396d8dc3c4a4bdb24082dd825f8b0ff1d663bcc8c2bbd70b8c757518f
                            • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 633 4051c0-4051d5 634 40528b-40528f 633->634 635 4051db-4051ed 633->635 636 4051f8-405204 lstrlenA 635->636 637 4051ef-4051f3 call 4060bb 635->637 639 405221-405225 636->639 640 405206-405216 lstrlenA 636->640 637->636 641 405234-405238 639->641 642 405227-40522e SetWindowTextA 639->642 640->634 643 405218-40521c lstrcatA 640->643 644 40523a-40527c SendMessageA * 3 641->644 645 40527e-405280 641->645 642->641 643->639 644->645 645->634 646 405282-405285 645->646 646->634
                            APIs
                            • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                            • lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                            • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                            • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll), ref: 0040522E
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll
                            • API String ID: 2531174081-2193090284
                            • Opcode ID: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                            • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                            • Opcode Fuzzy Hash: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                            • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 647 405686-4056d1 CreateDirectoryA 648 4056d3-4056d5 647->648 649 4056d7-4056e4 GetLastError 647->649 650 4056fe-405700 648->650 649->650 651 4056e6-4056fa SetFileSecurityA 649->651 651->648 652 4056fc GetLastError 651->652 652->650
                            APIs
                            • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                            • GetLastError.KERNEL32 ref: 004056DD
                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                            • GetLastError.KERNEL32 ref: 004056FC
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004056AC
                            • C:\Users\user\Desktop, xrefs: 00405686
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                            • API String ID: 3449924974-26219170
                            • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                            • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                            • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                            • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 653 4063c3-4063e3 GetSystemDirectoryA 654 4063e5 653->654 655 4063e7-4063e9 653->655 654->655 656 4063f9-4063fb 655->656 657 4063eb-4063f3 655->657 659 4063fc-40642e wsprintfA LoadLibraryExA 656->659 657->656 658 4063f5-4063f7 657->658 658->659
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                            • wsprintfA.USER32 ref: 00406413
                            • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406427
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%s.dll$UXTHEME$\
                            • API String ID: 2200240437-4240819195
                            • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                            • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                            • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                            • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 660 405c61-405c6b 661 405c6c-405c97 GetTickCount GetTempFileNameA 660->661 662 405ca6-405ca8 661->662 663 405c99-405c9b 661->663 665 405ca0-405ca3 662->665 663->661 664 405c9d 663->664 664->665
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405C75
                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405C8F
                            Strings
                            • nsa, xrefs: 00405C6C
                            • "C:\Users\user\Desktop\aMfizaMilo.exe", xrefs: 00405C61
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C64
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-3661303257
                            • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                            • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                            • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                            • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 666 100016bd-100016f9 call 10001a5d 670 1000180a-1000180c 666->670 671 100016ff-10001703 666->671 672 10001705-1000170b call 100021b0 671->672 673 1000170c-10001719 call 100021fa 671->673 672->673 678 10001749-10001750 673->678 679 1000171b-10001720 673->679 680 10001770-10001774 678->680 681 10001752-1000176e call 100023d8 call 10001559 call 10001266 GlobalFree 678->681 682 10001722-10001723 679->682 683 1000173b-1000173e 679->683 684 100017b2-100017b8 call 100023d8 680->684 685 10001776-100017b0 call 10001559 call 100023d8 680->685 706 100017b9-100017bd 681->706 688 10001725-10001726 682->688 689 1000172b-1000172c call 100027e4 682->689 683->678 686 10001740-10001741 call 10002a9f 683->686 684->706 685->706 699 10001746 686->699 694 10001733-10001739 call 10002587 688->694 695 10001728-10001729 688->695 702 10001731 689->702 705 10001748 694->705 695->678 695->689 699->705 702->699 705->678 709 100017fa-10001801 706->709 710 100017bf-100017cd call 1000239e 706->710 709->670 712 10001803-10001804 GlobalFree 709->712 716 100017e5-100017ec 710->716 717 100017cf-100017d2 710->717 712->670 716->709 718 100017ee-100017f9 call 100014e2 716->718 717->716 719 100017d4-100017dc 717->719 718->709 719->716 721 100017de-100017df FreeLibrary 719->721 721->716
                            APIs
                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                            • GlobalFree.KERNEL32(00000000), ref: 10001768
                            • FreeLibrary.KERNEL32(?), ref: 100017DF
                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                              • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                              • Part of subcall function 10002587: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025F9
                              • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc$Librarylstrcpy
                            • String ID:
                            • API String ID: 1791698881-3916222277
                            • Opcode ID: d00fcf5c1a7409290317dea9c84c75534a881091bfcc635988d0727071c870ea
                            • Instruction ID: 474564f2ddd1a30fda7ef2e88bb39d7445f8f4f5c00c78564696995dcbc9c57a
                            • Opcode Fuzzy Hash: d00fcf5c1a7409290317dea9c84c75534a881091bfcc635988d0727071c870ea
                            • Instruction Fuzzy Hash: C4319E79408205DAFB41DF649CC5BCA37ECFB042D5F118465FA0A9A09EDF78A8858B60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 723 401c04-401c24 call 402a9f * 2 728 401c30-401c34 723->728 729 401c26-401c2d call 402ac1 723->729 731 401c40-401c46 728->731 732 401c36-401c3d call 402ac1 728->732 729->728 735 401c94-401cba call 402ac1 * 2 FindWindowExA 731->735 736 401c48-401c64 call 402a9f * 2 731->736 732->731 746 401cc0 735->746 747 401c84-401c92 SendMessageA 736->747 748 401c66-401c82 SendMessageTimeoutA 736->748 749 401cc3-401cc6 746->749 747->746 748->749 750 402951-402960 749->750 751 401ccc 749->751 751->750
                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                            • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                            • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                            • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 754 4023d0-402401 call 402ac1 * 2 call 402b51 761 402951-402960 754->761 762 402407-402411 754->762 764 402421-402424 762->764 765 402413-402420 call 402ac1 lstrlenA 762->765 766 402426-402437 call 402a9f 764->766 767 402438-40243b 764->767 765->764 766->767 771 40244c-402460 RegSetValueExA 767->771 772 40243d-402447 call 40303e 767->772 776 402462 771->776 777 402465-402542 RegCloseKey 771->777 772->771 776->777 777->761 779 402716-40271d 777->779 779->761
                            APIs
                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsyFCA.tmp,00000023,00000011,00000002), ref: 0040241B
                            • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsyFCA.tmp,00000000,00000011,00000002), ref: 00402458
                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsyFCA.tmp,00000000,00000011,00000002), ref: 0040253C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseValuelstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp
                            • API String ID: 2655323295-73364148
                            • Opcode ID: 21db2f8f9692a3377bee1ea49589b4a1eede1b4b6c2deebe6580fb317b003819
                            • Instruction ID: f5012b3eed6b0e10d725da1925ea8f3c2a7a7eca851d842cc00ee1163223ef4a
                            • Opcode Fuzzy Hash: 21db2f8f9692a3377bee1ea49589b4a1eede1b4b6c2deebe6580fb317b003819
                            • Instruction Fuzzy Hash: DA115471E00215BEDF10EFA5DE89A9E7A74EB44754F21403BF508F71D1CAB84D419B29
                            APIs
                            • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 00402028
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                              • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll), ref: 0040522E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 00402038
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 004020B2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                            • String ID:
                            • API String ID: 2987980305-0
                            • Opcode ID: 88fa0b6539cab5ee48bbf94d2f3b0766d4e8639ddc33a2ee3b91e77515055371
                            • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                            • Opcode Fuzzy Hash: 88fa0b6539cab5ee48bbf94d2f3b0766d4e8639ddc33a2ee3b91e77515055371
                            • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E
                            APIs
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                            • RegCloseKey.ADVAPI32(?), ref: 00402C22
                            • RegCloseKey.ADVAPI32(?), ref: 00402C43
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Close$Enum
                            • String ID:
                            • API String ID: 464197530-0
                            • Opcode ID: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                            • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                            • Opcode Fuzzy Hash: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                            • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                            APIs
                              • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0,00000000), ref: 00405AD8
                              • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                              • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                            • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                              • Part of subcall function 00405686: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers,00000000,00000000,000000F0), ref: 0040163C
                            Strings
                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers, xrefs: 00401631
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\Beskikningers
                            • API String ID: 1892508949-4084520710
                            • Opcode ID: a1a99da81ec8ebe60bd9a559002f25b092f8fa51d43cb1406a9a8f8e6d1f3ea0
                            • Instruction ID: e80d591928eb94818456189605928617e464058bd7b4ab9a9bc67e70efbf424e
                            • Opcode Fuzzy Hash: a1a99da81ec8ebe60bd9a559002f25b092f8fa51d43cb1406a9a8f8e6d1f3ea0
                            • Instruction Fuzzy Hash: D3112731208151EBCF217BB54D415BF26B0DA92324B28093FE9D1B22E2D63D4D436A3F
                            APIs
                              • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0,00000000), ref: 00405AD8
                              • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                              • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                            • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0,00000000), ref: 00405B72
                            • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0), ref: 00405B82
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: C:\
                            • API String ID: 3248276644-3404278061
                            • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                            • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                            • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                            • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                            APIs
                            • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,004061C4,80000002), ref: 00405FC6
                            • RegCloseKey.KERNELBASE(?,?,004061C4,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll), ref: 00405FD1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: Call
                            • API String ID: 3356406503-1824292864
                            • Opcode ID: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                            • Instruction ID: 18c902175c261954d743b78889848fcc164f2ce977d73a6ea322bbd2e465ffc2
                            • Opcode Fuzzy Hash: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                            • Instruction Fuzzy Hash: CD01BC7250020AABDF228F20CC09FDB3FA8EF54364F00403AFA05A2190D278CA14DFA8
                            APIs
                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                            • CloseHandle.KERNEL32(?), ref: 0040576E
                            Strings
                            • Error launching installer, xrefs: 0040574B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                            • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                            • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                            • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                            • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                            • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                            • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                            • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                            • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                            • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                            • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                            • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                            • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                            • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                            • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                            • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                            • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                            • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                            • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                            • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                            • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                            • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                            • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                            • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                            • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                            APIs
                              • Part of subcall function 0040639C: FindFirstFileA.KERNELBASE(75D83410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0), ref: 004063A7
                              • Part of subcall function 0040639C: FindClose.KERNELBASE(00000000), ref: 004063B3
                            • lstrlenA.KERNEL32 ref: 00402285
                            • lstrlenA.KERNEL32(00000000), ref: 0040228F
                            • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004022B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FileFindlstrlen$CloseFirstOperation
                            • String ID:
                            • API String ID: 1486964399-0
                            • Opcode ID: b47fb53b0334603386ac124c2a285910fb3e70b2032b5f5d66ff835e7553619e
                            • Instruction ID: 7601fe6c075200cb0f0395ff2ba46aeb4d837e4f3c96b4285f6c21aa21cd7a5f
                            • Opcode Fuzzy Hash: b47fb53b0334603386ac124c2a285910fb3e70b2032b5f5d66ff835e7553619e
                            • Instruction Fuzzy Hash: F8117C71A14205AACB10EFF98949A9DBAF8AF44304F10403FA405FB2C2D6B8C5418B69
                            APIs
                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402511
                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 00402524
                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsyFCA.tmp,00000000,00000011,00000002), ref: 0040253C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Enum$CloseValue
                            • String ID:
                            • API String ID: 397863658-0
                            • Opcode ID: 8ae0c4f3e46a3f99f64f669cb9b9086aaa963cdd8b53f875c54c26ea0aedb13f
                            • Instruction ID: 518a01c90e212b4e6c6a91e55dc37795372a660c14e02f5234546a481bba951e
                            • Opcode Fuzzy Hash: 8ae0c4f3e46a3f99f64f669cb9b9086aaa963cdd8b53f875c54c26ea0aedb13f
                            • Instruction Fuzzy Hash: 9901B171A04105AFE7159F69DE9CABF7ABCEF80348F10003EF405A61C0DAB84A419729
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ErrorFileLastRead
                            • String ID:
                            • API String ID: 1948546556-0
                            • Opcode ID: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                            • Instruction ID: 7088a7f0c219bdfd589eed4d744adbaf06b55c7882bf085a68ef70f7e309f44b
                            • Opcode Fuzzy Hash: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                            • Instruction Fuzzy Hash: 385194BA908215DFF711EF60D9C575937A8EB443E0F21842AEA08E721DDF34A9818B55
                            APIs
                            • SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 00403063
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                            • Instruction ID: d45136b7277fa4a4eeb989eab338d16e1e03b20585a5145be81ea7fda6220a17
                            • Opcode Fuzzy Hash: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                            • Instruction Fuzzy Hash: 6C314F31204259EFDB109F56DD44A9A7FA8EB08759F10803AF905FA190D378DA50DBA9
                            APIs
                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040249D
                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsyFCA.tmp,00000000,00000011,00000002), ref: 0040253C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID:
                            • API String ID: 3356406503-0
                            • Opcode ID: 25d9f08b9c25ebc335b8f4a62a016f162dacef69ee2566890a70634c7d5b4c72
                            • Instruction ID: 1b22629e75d9b419b9fa7e371b5212fc4da00fb077cffe61c988f7dc4f8aba71
                            • Opcode Fuzzy Hash: 25d9f08b9c25ebc335b8f4a62a016f162dacef69ee2566890a70634c7d5b4c72
                            • Instruction Fuzzy Hash: 5511E771A05205EEDB15DF64DA8C5BE7BB4EF05348F20403FE446B72C0D6B88A42DB29
                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                            • Instruction ID: 0b9a08df0e19283e0c47f542131d218e25c17bbe1cc26e2bbd3e30b70dde81e4
                            • Opcode Fuzzy Hash: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                            • Instruction Fuzzy Hash: FD01F431B202109BE7194B389D05B6A36A8E710315F51823FF951F65F1D778CC038B4C
                            APIs
                            • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040239C
                            • RegCloseKey.ADVAPI32(00000000), ref: 004023A5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseDeleteValue
                            • String ID:
                            • API String ID: 2831762973-0
                            • Opcode ID: f83bd233bd8663726befb315590dbf39ea9cea469545d982e39583f4008de073
                            • Instruction ID: 4734060bda5bcd379add1307bf53be40299433fde06acb7bb12a187abd2f1290
                            • Opcode Fuzzy Hash: f83bd233bd8663726befb315590dbf39ea9cea469545d982e39583f4008de073
                            • Instruction Fuzzy Hash: 6CF09632B04111ABD710AFB89B8EABE76A89B80354F25003FEA05B71C1DAFC4D02476D
                            APIs
                            • ShowWindow.USER32(00000000,00000000), ref: 00401E43
                            • EnableWindow.USER32(00000000,00000000), ref: 00401E4E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Window$EnableShow
                            • String ID:
                            • API String ID: 1136574915-0
                            • Opcode ID: 70a93260b027f2004694904072cd59400e64644bb7532fd21934b6a3ced71637
                            • Instruction ID: f710efbc4c9934798fb848b4930091ab6df2b9d686602449302b85490548aed4
                            • Opcode Fuzzy Hash: 70a93260b027f2004694904072cd59400e64644bb7532fd21934b6a3ced71637
                            • Instruction Fuzzy Hash: C8E01272B082119FD714EBB6EA495AD77B4EF40315B11403BE415F11D1DE7888419F5D
                            APIs
                            • ShowWindow.USER32(00010440), ref: 00401581
                            • ShowWindow.USER32(0001043A), ref: 00401596
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: 61e2efb783f3023bff3ad6d967f60c2a1a0ca49b5590f8eabca18dd422d604b3
                            • Instruction ID: 0dda4fc35c74e8091563047f6652b1239714b114c1c6f120fbc2b65112c94b6f
                            • Opcode Fuzzy Hash: 61e2efb783f3023bff3ad6d967f60c2a1a0ca49b5590f8eabca18dd422d604b3
                            • Instruction Fuzzy Hash: 62E08672B001159BCB24DF68EDD087E77B5EB84311751053FD902B3290C6B8DD418B58
                            APIs
                            • GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • Part of subcall function 004063C3: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                              • Part of subcall function 004063C3: wsprintfA.USER32 ref: 00406413
                              • Part of subcall function 004063C3: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406427
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                            • Instruction ID: 56fda94a1dd54a43fb122a1991fe363568279dfba8e98efda579274c3b941564
                            • Opcode Fuzzy Hash: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                            • Instruction Fuzzy Hash: E3E086326042105AD2106BB09E0487773A89F84750302883EF946F2140D7389C75ABAE
                            APIs
                            • GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405C36
                            • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                            • Instruction ID: 44ec1511c7d75563636feacf23b0872b92cf9f9cc06fc18b7ec6e669f43cef59
                            • Opcode Fuzzy Hash: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                            • Instruction Fuzzy Hash: E4D09E71654201AFEF098F20DE16F2EBAA2EB84B00F11952CB682944E1DA715819AB19
                            APIs
                            • CreateDirectoryA.KERNELBASE(?,00000000,00403300,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405709
                            • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405717
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                            • Instruction ID: 9e29868ffe2b43b7798ba1daada82999d34952ab2a4b7d437405be2737e00dc4
                            • Opcode Fuzzy Hash: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                            • Instruction Fuzzy Hash: 0DC04C30225901DADA606F249F087177994FBA0741F1144396146E30E0EA348415ED2D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: wsprintf
                            • String ID:
                            • API String ID: 2111968516-0
                            • Opcode ID: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                            • Instruction ID: 014ce3e67ccbc0a67955049e33e6e2fc18f0270869ac9b4e1a99f60d8e299e74
                            • Opcode Fuzzy Hash: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                            • Instruction Fuzzy Hash: CC21F970D04295BEDF318B699948AAEBF749F11304F04457FE4D0B62D5C6BE8A82CF19
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A0
                              • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FilePointerwsprintf
                            • String ID:
                            • API String ID: 327478801-0
                            • Opcode ID: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                            • Instruction ID: daba68e88d81473494fab100d986bdd4d5457abcde4f4dc52411d400b48531e4
                            • Opcode Fuzzy Hash: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                            • Instruction Fuzzy Hash: BCE09B71B04116ABD700FB95AA4997E7768DF40304F10403FF515F00C1CA7D4C025B2D
                            APIs
                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040232F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: PrivateProfileStringWrite
                            • String ID:
                            • API String ID: 390214022-0
                            • Opcode ID: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                            • Instruction ID: f472a2c509351f333654906e099da5e6dfd11f42980ce41b172c94471a0d1cd1
                            • Opcode Fuzzy Hash: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                            • Instruction Fuzzy Hash: 8BE01A31B401246ADB207AB10E8E96E14989BC4744B29053ABE05B62C3DDBC4C414AB9
                            APIs
                            • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B72,00000000,?,?), ref: 00405F76
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                            • Instruction ID: b8b87f9e7f23a22b038ad66cb6348727c8887116b88fbbe418bbf9d15439b9dc
                            • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                            • Instruction Fuzzy Hash: B4E0E67201450DBEDF095F60DD0AD7B371DEB08304F04452EFA45D4091E7B5AD209E74
                            APIs
                            • WriteFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,0040D8F9,0040B8D8,00403246,0040B8D8,0040D8F9,004138D8,00004000,?,00000000,00403070,00000004), ref: 00405CED
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                            • Instruction ID: e5327eed263ed0cb59b3772f759b7efddda8826228879d6768eb485b7ec61b42
                            • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                            • Instruction Fuzzy Hash: CEE0EC3225065AABDF509E95AD08FEB7B6CEF053A0F008837F915E2150D631E821DBA8
                            APIs
                            • ReadFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,004138D8,0040B8D8,004032C2,0040A130,0040A130,004031C6,004138D8,00004000,?,00000000,00403070), ref: 00405CBE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                            • Instruction ID: 86bb3e2151b1fdd0dbac44507bcf00ea7ca2ece369def3772f3446380bdcc129
                            • Opcode Fuzzy Hash: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                            • Instruction Fuzzy Hash: DAE08C3220825EABEF109E508C00EEB3B6CFB00361F144432FD10E7040E230E860ABB4
                            APIs
                            • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 10002727
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                            • Instruction ID: e09dfa788fffc30199ef0a9f627684cb70e95bce5f527532b7ad3e980fb418b3
                            • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                            • Instruction Fuzzy Hash: 67F09BF19092A0DEF360DF688CC47063FE4E3983D5B03852AE358F6269EB7441448B19
                            APIs
                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040236D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: PrivateProfileString
                            • String ID:
                            • API String ID: 1096422788-0
                            • Opcode ID: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                            • Instruction ID: 8896498bc3bf22cdd75c41d4cee83ceff5cc5a9cf36b2948d6df5d4522980b60
                            • Opcode Fuzzy Hash: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                            • Instruction Fuzzy Hash: 82E08634B44308BADF10AFA19D49EAD3668AF41710F14403AFD547B0E2EEB844429B2D
                            APIs
                            • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405FAD,?,?,?,?,00000002,Call), ref: 00405F43
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction ID: 49134d8a29c384089d71c2fc87a48e1db8574b6415c3e00dd087e3758e4bfdf5
                            • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction Fuzzy Hash: C1D0EC3210420ABADF119E919D01FAB371DEB04350F004426BA45E4091D779D520AE54
                            APIs
                            • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: AttributesFile
                            • String ID:
                            • API String ID: 3188754299-0
                            • Opcode ID: 9092e01b63c1174d607e096a74ab4834703e604e2c64423c66f41cce52a313c8
                            • Instruction ID: ce3aa80a16c353682a4fc60f6c60757a41c4294f2dd63ac0650dc91194aad8f9
                            • Opcode Fuzzy Hash: 9092e01b63c1174d607e096a74ab4834703e604e2c64423c66f41cce52a313c8
                            • Instruction Fuzzy Hash: E1D0127270811197CB10DBA8AB4869D77A4EB80325B318137D515F21D1E6B9C945671D
                            APIs
                            • SendMessageA.USER32(00010434,00000000,00000000,00000000), ref: 004041B8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                            • Instruction ID: 55b95b209562bae9886b89f2f6925b48322e85585088ac1ac71ede26d93296ac
                            • Opcode Fuzzy Hash: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                            • Instruction Fuzzy Hash: 77C09B717407017BEA208F509E4DF0777A96750701F2944397760F60D0C6F4D450DA1C
                            APIs
                            • ShellExecuteExA.SHELL32(?,0040457F,?), ref: 0040578A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ExecuteShell
                            • String ID:
                            • API String ID: 587946157-0
                            • Opcode ID: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                            • Instruction ID: fedc52184ae6edd1acf052e6849869f1d6de8b7351bc39b82099fbd6471e80b9
                            • Opcode Fuzzy Hash: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                            • Instruction Fuzzy Hash: ECC092B2000200DFE301CF90CB18F077BE8AF55306F028058E1C49A160C7788810CB69
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                            APIs
                            • SendMessageA.USER32(00000028,?,?,00403FBF), ref: 0040419D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                            • Instruction ID: 10cfd25431557a88665167ebbf17620150c727a9bd7140e907e4ecff4ccdfc3e
                            • Opcode Fuzzy Hash: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                            • Instruction Fuzzy Hash: 30B09236280A00AAEE218B00DE09F457AA2E7A8742F028028B250240B0CAB200A1DB08
                            APIs
                            • KiUserCallbackDispatcher.NTDLL(?,00403F58), ref: 00404186
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CallbackDispatcherUser
                            • String ID:
                            • API String ID: 2492992576-0
                            • Opcode ID: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                            • Instruction ID: bd711969ba89efe8629f231cafa01baa053f2358784498ab8b3cf30639ef5a41
                            • Opcode Fuzzy Hash: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                            • Instruction Fuzzy Hash: 55A012320000009FCB014B50EF04C057F71AB543007018435E140400338A310821FF0C
                            APIs
                            • Sleep.KERNELBASE(00000000), ref: 004014E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: c0e700f1fcdc4ffa98e8290517b670d0cf04be8f77536005ba3f54c52213854c
                            • Instruction ID: 570e0916f0090f26c7ee0a6088be2661e77b817c4cb0ee023996dcc8b23dd1f7
                            • Opcode Fuzzy Hash: c0e700f1fcdc4ffa98e8290517b670d0cf04be8f77536005ba3f54c52213854c
                            • Instruction Fuzzy Hash: 96D05E73B141518BD754EBB9BA8845E73E4EB903153214837E852E2091EA78C8424A28
                            APIs
                            • CharNextA.USER32(?,0040341C,"C:\Users\user\Desktop\aMfizaMilo.exe",00000020,?,00000006,00000008,0000000A), ref: 00405A69
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharNext
                            • String ID:
                            • API String ID: 3213498283-0
                            • Opcode ID: ab770555e48e960fe56669f96fddfbd721eaa147c7a26f8897114aa6290c2379
                            • Instruction ID: c45932eabed93c867766aed611690f5da431da8c2ae2d2aeb709bbe64ce3ddc7
                            • Opcode Fuzzy Hash: ab770555e48e960fe56669f96fddfbd721eaa147c7a26f8897114aa6290c2379
                            • Instruction Fuzzy Hash: 50C08C34608B846BC620873095B89777FE0AE56340F2C85AAF0C2A3250D638AD008F2A
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                            • GetDlgItem.USER32(?,00000408), ref: 00404B60
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BAA
                            • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                            • SetWindowLongA.USER32(?,000000FC,00405134), ref: 00404BD6
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BEA
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C30
                            • DeleteObject.GDI32(00000000), ref: 00404C33
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404D6D
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D7B
                            • ShowWindow.USER32(?,00000005), ref: 00404D8C
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F03
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F27
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                            • ImageList_Destroy.COMCTL32(00000000), ref: 00404F5C
                            • GlobalFree.KERNEL32(00000000), ref: 00404F6C
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                            • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                            • InvalidateRect.USER32(?,00000000,?), ref: 004050BD
                            • ShowWindow.USER32(?,00000000), ref: 0040510B
                            • GetDlgItem.USER32(?,000003FE), ref: 00405116
                            • ShowWindow.USER32(00000000), ref: 0040511D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                            • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                            • Opcode Fuzzy Hash: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                            • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 00404619
                            • SetWindowTextA.USER32(00000000,?), ref: 00404643
                            • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                            • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                            • lstrcmpiA.KERNEL32(Call,symphonized: Installing), ref: 00404731
                            • lstrcatA.KERNEL32(?,Call), ref: 0040473D
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                              • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                              • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",75D83410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                              • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                              • Part of subcall function 00406303: CharNextA.USER32(?,"C:\Users\user\Desktop\aMfizaMilo.exe",75D83410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                              • Part of subcall function 00406303: CharPrevA.USER32(?,?,75D83410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                            • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,?,0041FD00,?,?,000003FB,?), ref: 0040480D
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                              • Part of subcall function 00404981: lstrlenA.KERNEL32(symphonized: Installing,symphonized: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                              • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,symphonized: Installing), ref: 00404A3A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$Call$symphonized: Installing
                            • API String ID: 2624150263-2234757521
                            • Opcode ID: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                            • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                            • Opcode Fuzzy Hash: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                            • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                            APIs
                              • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                            • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 10001B67
                            • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                            • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                            • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                            • GlobalFree.KERNEL32(?), ref: 10001CC4
                            • GlobalFree.KERNEL32(?), ref: 10001CC9
                            • GlobalFree.KERNEL32(?), ref: 10001CCE
                            • GlobalFree.KERNEL32(00000000), ref: 10001E76
                            • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$Free$lstrcpy$Alloc
                            • String ID:
                            • API String ID: 4227406936-0
                            • Opcode ID: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                            • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                            • Opcode Fuzzy Hash: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                            • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: c36892e06c5a05a47b1c83c5296ec74ed019d09ea245c2b35f81d61d6accc4a2
                            • Instruction ID: 0159b05a81fb7445ac67952f267e1ed3d95360429fb03f1bd53dceef05a54f2a
                            • Opcode Fuzzy Hash: c36892e06c5a05a47b1c83c5296ec74ed019d09ea245c2b35f81d61d6accc4a2
                            • Instruction Fuzzy Hash: EEF055727041019BC300EBB49948AEEB768DF21324F20017FE285F20C1C7B889469B3A
                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 0040432E
                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                            • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404360
                            • GetSysColor.USER32(?), ref: 00404371
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                            • lstrlenA.KERNEL32(?), ref: 00404392
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                            • GetDlgItem.USER32(?,0000040A), ref: 00404418
                            • SendMessageA.USER32(00000000), ref: 0040441B
                            • GetDlgItem.USER32(?,000003E8), ref: 00404446
                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                            • SetCursor.USER32(00000000), ref: 0040449E
                            • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                            • SetCursor.USER32(00000000), ref: 004044B7
                            • SendMessageA.USER32(00000111,?,00000000), ref: 004044E3
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004044F7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: Call$N$nB@
                            • API String ID: 3103080414-3023683851
                            • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                            • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                            • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                            • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                            • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                            • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                            • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                            • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                              • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                            • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                            • wsprintfA.USER32 ref: 00405D7D
                            • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DB8
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DC7
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                            • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                            • GlobalFree.KERNEL32(00000000), ref: 00405E66
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                              • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405C36
                              • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %s=%s$[Rename]
                            • API String ID: 2171350718-1727408572
                            • Opcode ID: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                            • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                            • Opcode Fuzzy Hash: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                            • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\aMfizaMilo.exe",75D83410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                            • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                            • CharNextA.USER32(?,"C:\Users\user\Desktop\aMfizaMilo.exe",75D83410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                            • CharPrevA.USER32(?,?,75D83410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                            Strings
                            • *?|<>/":, xrefs: 0040634B
                            • "C:\Users\user\Desktop\aMfizaMilo.exe", xrefs: 0040633F
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406304
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\Desktop\aMfizaMilo.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-3181516503
                            • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                            • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                            • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                            • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                            • GetSysColor.USER32(00000000), ref: 004041FA
                            • SetTextColor.GDI32(?,00000000), ref: 00404206
                            • SetBkMode.GDI32(?,?), ref: 00404212
                            • GetSysColor.USER32(?), ref: 00404225
                            • SetBkColor.GDI32(?,?), ref: 00404235
                            • DeleteObject.GDI32(?), ref: 0040424F
                            • CreateBrushIndirect.GDI32(?), ref: 00404259
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                            • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                            • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                            • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                            APIs
                              • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                            • GlobalFree.KERNEL32(?), ref: 100024B3
                            • GlobalFree.KERNEL32(00000000), ref: 100024ED
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                            • Instruction ID: c0db1d51d0d8beb2da32add46ec64f24e8f484468aa98c5ce89375ba0c102a5a
                            • Opcode Fuzzy Hash: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                            • Instruction Fuzzy Hash: 0831A9B1504211EFF322DB94CCC4C2B7BBDEB853D4B118929FA4193228CB31AC94DB62
                            APIs
                            • DestroyWindow.USER32(00000000,00000000), ref: 00402D11
                            • GetTickCount.KERNEL32 ref: 00402D2F
                            • wsprintfA.USER32 ref: 00402D5D
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                              • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsyFCA.tmp\System.dll), ref: 0040522E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                            • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                              • Part of subcall function 00402CDD: MulDiv.KERNEL32(00071511,00000064,00070927), ref: 00402CF2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                            • String ID: ... %d%%
                            • API String ID: 722711167-2449383134
                            • Opcode ID: 49248589531ca63bd1f6eb350bee73914f18f328555d002f4c75c07f849debaa
                            • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                            • Opcode Fuzzy Hash: 49248589531ca63bd1f6eb350bee73914f18f328555d002f4c75c07f849debaa
                            • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                            • GetMessagePos.USER32 ref: 00404AAE
                            • ScreenToClient.USER32(?,?), ref: 00404AC8
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                            • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                            APIs
                            • GetDC.USER32(?), ref: 00401D98
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                            • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                            • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID: Times New Roman
                            • API String ID: 3808545654-927190056
                            • Opcode ID: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                            • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                            • Opcode Fuzzy Hash: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                            • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                            APIs
                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C7C
                            • wsprintfA.USER32 ref: 00402CB0
                            • SetWindowTextA.USER32(?,?), ref: 00402CC0
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                            • API String ID: 1451636040-1158693248
                            • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                            • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                            • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                            • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                            APIs
                            • GlobalFree.KERNEL32(00000000), ref: 10002348
                              • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C5
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022DA
                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E9
                            • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F7
                            • GlobalFree.KERNEL32(00000000), ref: 100022FE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                            • String ID:
                            • API String ID: 3730416702-0
                            • Opcode ID: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                            • Instruction ID: a642113aa4013a2ca06c871554e8d399cf46bf4099943ddf9e0960cc50565d32
                            • Opcode Fuzzy Hash: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                            • Instruction Fuzzy Hash: A941BCB1508311EFF320DF648C84B6AB7E8FF443D0F11892AF946D61A9DB34AA40CB61
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                            • GlobalFree.KERNEL32(?), ref: 004027E5
                            • GlobalFree.KERNEL32(00000000), ref: 004027F8
                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: 6c7dcdf8261c9d786bb24efcf90e0f1d33b45d541b425cde03fb6c43c6f2b2c7
                            • Instruction ID: 2027d9f4b10c536beff5d97c30926d1382b99fb2686dd4663458e7dd77d5dad7
                            • Opcode Fuzzy Hash: 6c7dcdf8261c9d786bb24efcf90e0f1d33b45d541b425cde03fb6c43c6f2b2c7
                            • Instruction Fuzzy Hash: C5219C71800128BBDF216FA5DE49DAE7A79EF05324F14423EF524762E1CA794D418FA8
                            APIs
                            • lstrlenA.KERNEL32(symphonized: Installing,symphonized: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                            • wsprintfA.USER32 ref: 00404A27
                            • SetDlgItemTextA.USER32(?,symphonized: Installing), ref: 00404A3A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s$symphonized: Installing
                            • API String ID: 3540041739-853358426
                            • Opcode ID: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                            • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                            • Opcode Fuzzy Hash: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                            • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                            APIs
                            • GetDlgItem.USER32(?), ref: 00401D3F
                            • GetClientRect.USER32(00000000,?), ref: 00401D4C
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                            • DeleteObject.GDI32(00000000), ref: 00401D8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: ffde7fea2c20ff78d34b9dd6ca395fc00db0322e175274b43119d545686d3dc4
                            • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                            • Opcode Fuzzy Hash: ffde7fea2c20ff78d34b9dd6ca395fc00db0322e175274b43119d545686d3dc4
                            • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                            APIs
                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405A37
                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405A40
                            • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405A51
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A31
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-3355392842
                            • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                            • Instruction ID: 868260c831235620665dea70b18de3ff29fa680cd517475ab4f5cc36a8a73f00
                            • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                            • Instruction Fuzzy Hash: 79D023726015303AD1127F154C05DCF1A4C8F023507050077F200B7191CB3C0D514BFE
                            APIs
                            • CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0,00000000), ref: 00405AD8
                            • CharNextA.USER32(00000000), ref: 00405ADD
                            • CharNextA.USER32(00000000), ref: 00405AF1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharNext
                            • String ID: C:\
                            • API String ID: 3213498283-3404278061
                            • Opcode ID: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                            • Instruction ID: db937687bc36527a3f7147c44c8c9b1a0bf4ed848bee0725310acd997699ac17
                            • Opcode Fuzzy Hash: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                            • Instruction Fuzzy Hash: D8F0C861B14F501AFB2262640C54B776BA8CB99350F04406BD540671C286BC6C404F6A
                            APIs
                            • CloseHandle.KERNEL32(000002C4,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                            • CloseHandle.KERNEL32(000002A8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                            Strings
                            • C:\Users\user\AppData\Local\Temp\nsyFCA.tmp, xrefs: 0040382D
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004037FC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsyFCA.tmp
                            • API String ID: 2962429428-3821288084
                            • Opcode ID: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                            • Instruction ID: a243388e665e2d569925beaf0092b2dcbae65f1e85c6ca02b15765f08549dd2e
                            • Opcode Fuzzy Hash: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                            • Instruction Fuzzy Hash: 08E04F3250071896C620BF79AE494853B599B41735724C776F138B20F1C73899975AA9
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00405163
                            • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                              • Part of subcall function 004041A6: SendMessageA.USER32(00010434,00000000,00000000,00000000), ref: 004041B8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                            • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                            • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                            • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                            APIs
                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\aMfizaMilo.exe,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405A7E
                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\aMfizaMilo.exe,C:\Users\user\Desktop\aMfizaMilo.exe,80000000,00000003), ref: 00405A8C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-3370423016
                            • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                            • Instruction ID: 40098e637bf6d505f922d12736ff559178fc12fa7d0ee67292c12de19d06dc46
                            • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                            • Instruction Fuzzy Hash: 6ED0A7729089702EF30393108C00B9F6A88CF16341F090062E480A7191C67C0C424BAD
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                            • GlobalFree.KERNEL32(00000000), ref: 100011B4
                            • GlobalFree.KERNEL32(?), ref: 100011C7
                            • GlobalFree.KERNEL32(?), ref: 100011F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1930724144.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000000.00000002.1930695430.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930753672.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.1930780862.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_10000000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                            • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                            • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                            • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                            • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                            • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1918213291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1918168725.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918253734.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918284714.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1918514191.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                            • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                            • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                            • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9
                            APIs
                            • SetErrorMode.KERNEL32 ref: 00403332
                            • GetVersion.KERNEL32 ref: 00403338
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033A7
                            • OleInitialize.OLE32(00000000), ref: 004033AE
                            • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033CA
                            • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033DF
                            • GetModuleHandleA.KERNEL32(00000000,0042A000,00000000,?,00000006,00000008,0000000A), ref: 004033F2
                            • CharNextA.USER32(00000000,0042A000,00000020,?,00000006,00000008,0000000A), ref: 0040341D
                            • GetTempPathA.KERNEL32(00000400,0042B400,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040351A
                            • GetWindowsDirectoryA.KERNEL32(0042B400,000003FB,?,00000006,00000008,0000000A), ref: 0040352B
                            • lstrcatA.KERNEL32(0042B400,\Temp,?,00000006,00000008,0000000A), ref: 00403537
                            • GetTempPathA.KERNEL32(000003FC,0042B400,0042B400,\Temp,?,00000006,00000008,0000000A), ref: 0040354B
                            • lstrcatA.KERNEL32(0042B400,Low,?,00000006,00000008,0000000A), ref: 00403553
                            • SetEnvironmentVariableA.KERNEL32(TEMP,0042B400,0042B400,Low,?,00000006,00000008,0000000A), ref: 00403564
                            • SetEnvironmentVariableA.KERNEL32(TMP,0042B400,?,00000006,00000008,0000000A), ref: 0040356C
                            • DeleteFileA.KERNEL32(0042B000,?,00000006,00000008,0000000A), ref: 00403580
                              • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              • Part of subcall function 004038E9: lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75D83410), ref: 004039D9
                              • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(004236C0), ref: 004039F7
                              • Part of subcall function 004038E9: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,0042A400), ref: 00403A40
                              • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • Part of subcall function 004037F7: CloseHandle.KERNEL32(FFFFFFFF,0042B400,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                              • Part of subcall function 004037F7: CloseHandle.KERNEL32(FFFFFFFF,0042B400,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                            • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040362E
                            • ExitProcess.KERNEL32 ref: 0040364F
                            • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040376C
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                            • ExitProcess.KERNEL32 ref: 004037F1
                              • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                            • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3704715180-3941163293
                            • Opcode ID: f873ef8a45b584c720bb88a4428bdce3541239ead945e93ac8a036a0ff26db3b
                            • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                            • Opcode Fuzzy Hash: f873ef8a45b584c720bb88a4428bdce3541239ead945e93ac8a036a0ff26db3b
                            • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                            • GetDlgItem.USER32(?,00000408), ref: 00404B60
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BAA
                            • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                            • SetWindowLongA.USER32(?,000000FC,00405134), ref: 00404BD6
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BEA
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C30
                            • DeleteObject.GDI32(00000000), ref: 00404C33
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404D6D
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D7B
                            • ShowWindow.USER32(?,00000005), ref: 00404D8C
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F03
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F27
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                            • ImageList_Destroy.COMCTL32(?), ref: 00404F5C
                            • GlobalFree.KERNEL32(?), ref: 00404F6C
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                            • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                            • InvalidateRect.USER32(?,00000000,?), ref: 004050BD
                            • ShowWindow.USER32(?,00000000), ref: 0040510B
                            • GetDlgItem.USER32(?,000003FE), ref: 00405116
                            • ShowWindow.USER32(00000000), ref: 0040511D
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: d8afd28a0c3ee7a5ecc07d83f55fb30fbace4eef79b80df0a3b445219cdd2625
                            • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                            • Opcode Fuzzy Hash: d8afd28a0c3ee7a5ecc07d83f55fb30fbace4eef79b80df0a3b445219cdd2625
                            • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                            APIs
                            • DeleteFileA.KERNEL32(?,?,75D83410,75D82EE0,00000000), ref: 0040588A
                            • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 004058D2
                            • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 004058F3
                            • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 004058F9
                            • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,75D83410,75D82EE0,00000000), ref: 0040590A
                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                            • FindClose.KERNEL32(00000000), ref: 004059C8
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: \*.*
                            • API String ID: 2035342205-1173974218
                            • Opcode ID: 3ebdef7a8bfe5bb7036cc40bba984425dda0d6b7b6891e5c0f59388fd5a4de97
                            • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                            • Opcode Fuzzy Hash: 3ebdef7a8bfe5bb7036cc40bba984425dda0d6b7b6891e5c0f59388fd5a4de97
                            • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                            • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                            • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                            • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 0040535D
                            • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                            • GetClientRect.USER32(?,?), ref: 004053A9
                            • GetSystemMetrics.USER32(00000002), ref: 004053B0
                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                            • ShowWindow.USER32(?,00000008), ref: 0040544C
                            • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                            • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                              • Part of subcall function 0040418F: SendMessageA.USER32(00000028,?,?,00403FBF), ref: 0040419D
                            • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                            • CreateThread.KERNEL32(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                            • CloseHandle.KERNEL32(00000000), ref: 004054D3
                            • ShowWindow.USER32(00000000), ref: 004054F6
                            • ShowWindow.USER32(?,00000008), ref: 004054FD
                            • ShowWindow.USER32(00000008), ref: 00405543
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                            • CreatePopupMenu.USER32 ref: 00405588
                            • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 0040559D
                            • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055D6
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                            • OpenClipboard.USER32(00000000), ref: 00405622
                            • EmptyClipboard.USER32 ref: 00405628
                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                            • GlobalLock.KERNEL32(00000000), ref: 0040563B
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                            • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                            • SetClipboardData.USER32(?,00000000), ref: 00405673
                            • CloseClipboard.USER32 ref: 00405679
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID: 0B
                            • API String ID: 590372296-4132856435
                            • Opcode ID: 3f3f8157529fe7dfee1cc0433fd35ac1c8f506144681312bbf4a5472d80bc8bd
                            • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                            • Opcode Fuzzy Hash: 3f3f8157529fe7dfee1cc0433fd35ac1c8f506144681312bbf4a5472d80bc8bd
                            • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                            • ShowWindow.USER32(?), ref: 00403CDF
                            • DestroyWindow.USER32 ref: 00403CF3
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                            • GetDlgItem.USER32(?,?), ref: 00403D30
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                            • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                            • GetDlgItem.USER32(?,?), ref: 00403DF9
                            • GetDlgItem.USER32(?,00000002), ref: 00403E03
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                            • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403E6E
                            • GetDlgItem.USER32(?,00000003), ref: 00403F14
                            • ShowWindow.USER32(00000000,?), ref: 00403F35
                            • EnableWindow.USER32(?,?), ref: 00403F47
                            • EnableWindow.USER32(?,?), ref: 00403F62
                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F78
                            • EnableMenuItem.USER32(00000000), ref: 00403F7F
                            • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403F97
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                            • lstrlenA.KERNEL32(00420D30,?,00420D30,00000000), ref: 00403FD4
                            • SetWindowTextA.USER32(?,00420D30), ref: 00403FE3
                            • ShowWindow.USER32(?,0000000A), ref: 00404117
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID: 0B
                            • API String ID: 184305955-4132856435
                            • Opcode ID: 494e5d15f52d909de3728dffe2acfde06eca01d490e6fb77ff0f3207f2f85486
                            • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                            • Opcode Fuzzy Hash: 494e5d15f52d909de3728dffe2acfde06eca01d490e6fb77ff0f3207f2f85486
                            • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D
                            APIs
                              • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                            • lstrcatA.KERNEL32(0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75D83410,0042B400,0042A000,00000000), ref: 00403964
                            • lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75D83410), ref: 004039D9
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                            • GetFileAttributesA.KERNEL32(004236C0), ref: 004039F7
                            • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,0042A400), ref: 00403A40
                              • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                            • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A95
                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                            • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                            • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                            • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                            • RegisterClassA.USER32(00423EC0), ref: 00403B42
                            • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: .DEFAULT\Control Panel\International$.exe$0B$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                            • API String ID: 1975747703-610843794
                            • Opcode ID: c0b74264b80d684e05b9670c33d338dc849c687744dfa108ed2df9d331500c62
                            • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                            • Opcode Fuzzy Hash: c0b74264b80d684e05b9670c33d338dc849c687744dfa108ed2df9d331500c62
                            • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D
                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 0040432E
                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                            • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404360
                            • GetSysColor.USER32(?), ref: 00404371
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                            • lstrlenA.KERNEL32(?), ref: 00404392
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                            • GetDlgItem.USER32(?,0000040A), ref: 00404418
                            • SendMessageA.USER32(00000000), ref: 0040441B
                            • GetDlgItem.USER32(?,000003E8), ref: 00404446
                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                            • SetCursor.USER32(00000000), ref: 0040449E
                            • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                            • SetCursor.USER32(00000000), ref: 004044B7
                            • SendMessageA.USER32(00000111,?,00000000), ref: 004044E3
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004044F7
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: N$nB@
                            • API String ID: 3103080414-4167803745
                            • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                            • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                            • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                            • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                            • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                            • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                            • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 00404619
                            • SetWindowTextA.USER32(00000000,?), ref: 00404643
                            • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                            • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                            • lstrcmpiA.KERNEL32(004236C0,00420D30), ref: 00404731
                            • lstrcatA.KERNEL32(?,004236C0), ref: 0040473D
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                              • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                              • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,0042A000,75D83410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                              • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                              • Part of subcall function 00406303: CharNextA.USER32(?,0042A000,75D83410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                              • Part of subcall function 00406303: CharPrevA.USER32(?,?,75D83410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                            • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,?,0041FD00,?,?,000003FB,?), ref: 0040480D
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                              • Part of subcall function 00404981: lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                              • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: 0B$A
                            • API String ID: 2624150263-373579336
                            • Opcode ID: dabeba3b97e2907f87f04c2d0dd353413e682be42e818b22754e0aedb349eabf
                            • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                            • Opcode Fuzzy Hash: dabeba3b97e2907f87f04c2d0dd353413e682be42e818b22754e0aedb349eabf
                            • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                            • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                              • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                            • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                            • wsprintfA.USER32 ref: 00405D7D
                            • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DB8
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DC7
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                            • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                            • GlobalFree.KERNEL32(00000000), ref: 00405E66
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                              • Part of subcall function 00405C32: GetFileAttributesA.KERNEL32(00000003,00402DDB,0042BC00,80000000,00000003), ref: 00405C36
                              • Part of subcall function 00405C32: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %s=%s$[Rename]
                            • API String ID: 2171350718-1727408572
                            • Opcode ID: c723dcda6b53f61ccdafe327344b31b2963e039a378ed67f4dc0120c4ff23498
                            • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                            • Opcode Fuzzy Hash: c723dcda6b53f61ccdafe327344b31b2963e039a378ed67f4dc0120c4ff23498
                            • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402DAC
                            • GetModuleFileNameA.KERNEL32(00000000,0042BC00,00000400), ref: 00402DC8
                              • Part of subcall function 00405C32: GetFileAttributesA.KERNEL32(00000003,00402DDB,0042BC00,80000000,00000003), ref: 00405C36
                              • Part of subcall function 00405C32: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405C58
                            • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,0042AC00,0042AC00,0042BC00,0042BC00,80000000,00000003), ref: 00402E11
                            • GlobalAlloc.KERNEL32(00000040,0040A130), ref: 00402F58
                            Strings
                            • Error launching installer, xrefs: 00402DE8
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FEF
                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FA1
                            • Inst, xrefs: 00402E7F
                            • Null, xrefs: 00402E91
                            • soft, xrefs: 00402E88
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 2803837635-3016655952
                            • Opcode ID: 186828efae30a8a2c236a5659a586d8060acad418c34dac636486169236efce2
                            • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                            • Opcode Fuzzy Hash: 186828efae30a8a2c236a5659a586d8060acad418c34dac636486169236efce2
                            • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C
                            APIs
                            • GetSystemDirectoryA.KERNEL32(004236C0,00000400), ref: 004061E6
                            • GetWindowsDirectoryA.KERNEL32(004236C0,00000400,?,00420510,00000000,004051F8,00420510,00000000), ref: 004061F9
                            • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,00420510,00000000,004051F8,00420510,00000000), ref: 00406235
                            • SHGetPathFromIDListA.SHELL32(00000000,004236C0), ref: 00406243
                            • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                            • lstrcatA.KERNEL32(004236C0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                            • lstrlenA.KERNEL32(004236C0,?,00420510,00000000,004051F8,00420510,00000000,00000000,00000000,00000000), ref: 004062C5
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 004061B5
                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040626D
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 717251189-730719616
                            • Opcode ID: 84b556ce97db38d950ada7426c365b30dcfc03bcdc7c69a4d791f1b42b63748e
                            • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                            • Opcode Fuzzy Hash: 84b556ce97db38d950ada7426c365b30dcfc03bcdc7c69a4d791f1b42b63748e
                            • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                            • GetSysColor.USER32(00000000), ref: 004041FA
                            • SetTextColor.GDI32(?,00000000), ref: 00404206
                            • SetBkMode.GDI32(?,?), ref: 00404212
                            • GetSysColor.USER32(?), ref: 00404225
                            • SetBkColor.GDI32(?,?), ref: 00404235
                            • DeleteObject.GDI32(?), ref: 0040424F
                            • CreateBrushIndirect.GDI32(?), ref: 00404259
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                            • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                            • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                            • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                            APIs
                            • lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                            • lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                            • lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                            • SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                            • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                            • Opcode Fuzzy Hash: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                            • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8
                            APIs
                            • DestroyWindow.USER32(?,00000000), ref: 00402D11
                            • GetTickCount.KERNEL32 ref: 00402D2F
                            • wsprintfA.USER32 ref: 00402D5D
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                              • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                            • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                              • Part of subcall function 00402CDD: MulDiv.KERNEL32(?,00000064,?), ref: 00402CF2
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                            • String ID: ... %d%%
                            • API String ID: 722711167-2449383134
                            • Opcode ID: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                            • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                            • Opcode Fuzzy Hash: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                            • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                            • GetMessagePos.USER32 ref: 00404AAE
                            • ScreenToClient.USER32(?,?), ref: 00404AC8
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                            • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                            APIs
                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C7C
                            • wsprintfA.USER32 ref: 00402CB0
                            • SetWindowTextA.USER32(?,?), ref: 00402CC0
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                            • API String ID: 1451636040-1158693248
                            • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                            • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                            • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                            • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                            • wsprintfA.USER32 ref: 00406413
                            • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 00406427
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%s.dll$UXTHEME$\
                            • API String ID: 2200240437-4240819195
                            • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                            • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                            • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                            • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                            • GlobalFree.KERNEL32(?), ref: 004027E5
                            • GlobalFree.KERNEL32(00000000), ref: 004027F8
                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: dcacf9be938e6bab2b24fd9971acd25967e82a84bb27c597e485d254bc79bccb
                            • Instruction ID: 2027d9f4b10c536beff5d97c30926d1382b99fb2686dd4663458e7dd77d5dad7
                            • Opcode Fuzzy Hash: dcacf9be938e6bab2b24fd9971acd25967e82a84bb27c597e485d254bc79bccb
                            • Instruction Fuzzy Hash: C5219C71800128BBDF216FA5DE49DAE7A79EF05324F14423EF524762E1CA794D418FA8
                            APIs
                            • lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                            • wsprintfA.USER32 ref: 00404A27
                            • SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s$0B
                            • API String ID: 3540041739-2032437577
                            • Opcode ID: b23186d452688b2e8875940d2b1567af98af2718b135d1178c3f368161fe70b0
                            • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                            • Opcode Fuzzy Hash: b23186d452688b2e8875940d2b1567af98af2718b135d1178c3f368161fe70b0
                            • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,0042A000,75D83410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                            • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                            • CharNextA.USER32(?,0042A000,75D83410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                            • CharPrevA.USER32(?,?,75D83410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: *?|<>/":
                            • API String ID: 589700163-165019052
                            • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                            • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                            • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                            • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 00401798
                            • CompareFileTime.KERNEL32(-00000014,?,0040A400,0040A400,00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 004017C2
                              • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                              • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID:
                            • API String ID: 1941528284-0
                            • Opcode ID: dc8ff8f613ccaf3a1bdddd658223a71cf5c03a6f10e6b809243d1d3cf6c4a793
                            • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                            • Opcode Fuzzy Hash: dc8ff8f613ccaf3a1bdddd658223a71cf5c03a6f10e6b809243d1d3cf6c4a793
                            • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E
                            APIs
                            • GetDC.USER32(?), ref: 00401D98
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                            • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                            • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID:
                            • API String ID: 3808545654-0
                            • Opcode ID: 74ac6799808a35a38ef0222afa5692bf00b997bfa79daeac73048440a50110dd
                            • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                            • Opcode Fuzzy Hash: 74ac6799808a35a38ef0222afa5692bf00b997bfa79daeac73048440a50110dd
                            • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                            APIs
                            • GetDlgItem.USER32(?), ref: 00401D3F
                            • GetClientRect.USER32(00000000,?), ref: 00401D4C
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                            • DeleteObject.GDI32(00000000), ref: 00401D8A
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: ad1215dfc819b2c5c4de7a1a53f68875bc6cfa7ccac298a48e27e0db3473e380
                            • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                            • Opcode Fuzzy Hash: ad1215dfc819b2c5c4de7a1a53f68875bc6cfa7ccac298a48e27e0db3473e380
                            • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                            • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                            • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                            • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,?,000000F0), ref: 00402028
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                              • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                            • LoadLibraryExA.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00402038
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 004020B2
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                            • String ID:
                            • API String ID: 2987980305-0
                            • Opcode ID: 3b5be73adf85405213ea04b1693982704ad386d22b40f5588508e7c9aa8f58d6
                            • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                            • Opcode Fuzzy Hash: 3b5be73adf85405213ea04b1693982704ad386d22b40f5588508e7c9aa8f58d6
                            • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E
                            APIs
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                            • RegCloseKey.ADVAPI32(?), ref: 00402C22
                            • RegCloseKey.ADVAPI32(?), ref: 00402C43
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Close$Enum
                            • String ID:
                            • API String ID: 464197530-0
                            • Opcode ID: 03e0a49003aaeb5a403670c18ff433aeaee3fdf9291277d8cb25cd743ef3ba95
                            • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                            • Opcode Fuzzy Hash: 03e0a49003aaeb5a403670c18ff433aeaee3fdf9291277d8cb25cd743ef3ba95
                            • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                            APIs
                            • CreateDirectoryA.KERNEL32(?,?,0042B400), ref: 004056C9
                            • GetLastError.KERNEL32 ref: 004056DD
                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                            • GetLastError.KERNEL32 ref: 004056FC
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID:
                            • API String ID: 3449924974-0
                            • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                            • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                            • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                            • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9
                            APIs
                              • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                              • Part of subcall function 00405ACA: CharNextA.USER32(?,?,00422138,?,00405B36,00422138,00422138,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0,00000000), ref: 00405AD8
                              • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                              • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                            • lstrlenA.KERNEL32(00422138,00000000,00422138,00422138,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0,00000000), ref: 00405B72
                            • GetFileAttributesA.KERNEL32(00422138,00422138,00422138,00422138,00422138,00422138,00000000,00422138,00422138,75D83410,?,75D82EE0,00405881,?,75D83410,75D82EE0), ref: 00405B82
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: 8!B
                            • API String ID: 3248276644-3245627493
                            • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                            • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                            • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                            • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00405163
                            • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                              • Part of subcall function 004041A6: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 004041B8
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                            • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                            • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                            • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405C75
                            • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405C8F
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: nsa
                            • API String ID: 1716503409-2209301699
                            • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                            • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                            • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                            • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758
                            APIs
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                            • CloseHandle.KERNEL32(?), ref: 0040576E
                            Strings
                            • Error launching installer, xrefs: 0040574B
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                            • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                            • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                            • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                            • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                            • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                            • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                            • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                            • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                            • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                            • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                            • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                            • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                            • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                            • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                            • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                            • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                            • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                            • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                            • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                            • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                            • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                            • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                            • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                            • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                            • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                            • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                            Memory Dump Source
                            • Source File: 00000003.00000002.6232708204.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000003.00000002.6232565713.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232811825.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6232942565.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000003.00000002.6233047152.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_400000_aMfizaMilo.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                            • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                            • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                            • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9