Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LkzvfB4VFj.exe

Overview

General Information

Sample name:LkzvfB4VFj.exe
renamed because original name is a hash value
Original sample name:aa047fd2e21f33564c1178d063122fc9368afc5c6a5455c4381a3f5edde4b145.exe
Analysis ID:1552178
MD5:a5104b4d665dc081181fd163dce0bb77
SHA1:e72855a64aace2ecf6aa008942e443d2ac7508d7
SHA256:aa047fd2e21f33564c1178d063122fc9368afc5c6a5455c4381a3f5edde4b145
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LkzvfB4VFj.exe (PID: 5852 cmdline: "C:\Users\user\Desktop\LkzvfB4VFj.exe" MD5: A5104B4D665DC081181FD163DCE0BB77)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3734765818.0000000005D64000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-11-08T14:12:38.993964+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749731TCP
    2024-11-08T14:13:22.655714+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749918TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: LkzvfB4VFj.exeAvira: detected
    Source: LkzvfB4VFj.exeReversingLabs: Detection: 55%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
    Source: LkzvfB4VFj.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: LkzvfB4VFj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49731
    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49918
    Source: LkzvfB4VFj.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: LkzvfB4VFj.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040535C
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05E41486 NtAllocateVirtualMemory,0_2_05E41486
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile created: C:\Windows\Arder.lnkJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_004069450_2_00406945
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_0040711C0_2_0040711C
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_701A1A980_2_701A1A98
    Source: LkzvfB4VFj.exeStatic PE information: invalid certificate
    Source: LkzvfB4VFj.exe, 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs LkzvfB4VFj.exe
    Source: LkzvfB4VFj.exeBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs LkzvfB4VFj.exe
    Source: LkzvfB4VFj.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040460D
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile created: C:\Users\user\tranchetJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsaA4B6.tmpJump to behavior
    Source: LkzvfB4VFj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: LkzvfB4VFj.exeReversingLabs: Detection: 55%
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile read: C:\Users\user\Desktop\LkzvfB4VFj.exeJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: Arder.lnk.0.drLNK file: ..\Users\user\Disannex.And37
    Source: LkzvfB4VFj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.3734765818.0000000005D64000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_701A1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_701A1A98
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_701A2F60 push eax; ret 0_2_701A2F8E
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D667E4 push cs; iretd 0_2_05D667F7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D677E4 push cs; iretd 0_2_05D677F7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D67DE4 push cs; iretd 0_2_05D67DF7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D67FE4 push cs; iretd 0_2_05D67FF7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D685E1 push cs; iretd 0_2_05D685F7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D64749 push 00000063h; ret 0_2_05D6474B
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D654F6 push cs; iretd 0_2_05D654F7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D66CF6 push cs; iretd 0_2_05D66CF7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D67CF6 push cs; iretd 0_2_05D67CF7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D684F6 push cs; iretd 0_2_05D684F7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D692F4 push eax; iretd 0_2_05D692F5
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D682E7 push cs; iretd 0_2_05D682F7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D66AE4 push cs; iretd 0_2_05D66AF7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D67AE1 push cs; iretd 0_2_05D67AF7
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D650B9 pushfd ; ret 0_2_05D650BA
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D68812 pushfd ; retf 0_2_05D68819
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D68400 pushfd ; iretd 0_2_05D68419
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_05D6700C pushfd ; ret 0_2_05D67019
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeFile created: C:\Users\user\AppData\Local\Temp\nssB5BF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeRDTSC instruction interceptor: First address: 5E197AF second address: 5E197AF instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F80E8B7F78Ah 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssB5BF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeAPI call chain: ExitProcess graph end nodegraph_0-4403
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeAPI call chain: ExitProcess graph end nodegraph_0-4580
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_701A1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_701A1A98
    Source: C:\Users\user\Desktop\LkzvfB4VFj.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    LkzvfB4VFj.exe55%ReversingLabsWin32.Trojan.Guloader
    LkzvfB4VFj.exe100%AviraTR/Injector.kowvu
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nssB5BF.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorLkzvfB4VFj.exefalse
      high
      http://nsis.sf.net/NSIS_ErrorErrorLkzvfB4VFj.exefalse
        high
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1552178
        Start date and time:2024-11-08 14:11:19 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 33s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:12
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:LkzvfB4VFj.exe
        renamed because original name is a hash value
        Original Sample Name:aa047fd2e21f33564c1178d063122fc9368afc5c6a5455c4381a3f5edde4b145.exe
        Detection:MAL
        Classification:mal72.troj.evad.winEXE@1/8@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 48
        • Number of non-executed functions: 29
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateKey calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: LkzvfB4VFj.exe
        No simulations
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nssB5BF.tmp\System.dllz120X20SO__UK__EKMELAMA.exeGet hashmaliciousGuLoader, RemcosBrowse
          Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
            Produkttyper.exeGet hashmaliciousFormBook, GuLoaderBrowse
              Impressionist.exeGet hashmaliciousGuLoaderBrowse
                PAGO.exeGet hashmaliciousGuLoaderBrowse
                  PAGO.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    Obstetricated.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      Orden de compra.exeGet hashmaliciousGuLoaderBrowse
                        Orden de compra.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          Orden de compra.exeGet hashmaliciousGuLoaderBrowse
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11776
                            Entropy (8bit):5.854450882766351
                            Encrypted:false
                            SSDEEP:192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
                            MD5:34442E1E0C2870341DF55E1B7B3CCCDC
                            SHA1:99B2FA21AEAD4B6CCD8FF2F6D3D3453A51D9C70C
                            SHA-256:269D232712C86983336BADB40B9E55E80052D8389ED095EBF9214964D43B6BB1
                            SHA-512:4A8C57FB12997438B488B862F3FC9DC0F236E07BB47B2BCE6053DCB03AC7AD171842F02AC749F02DDA4719C681D186330524CD2953D33CB50854844E74B33D51
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: z120X20SO__UK__EKMELAMA.exe, Detection: malicious, Browse
                            • Filename: Quotation-GINC-19-00204.exe, Detection: malicious, Browse
                            • Filename: Produkttyper.exe, Detection: malicious, Browse
                            • Filename: Impressionist.exe, Detection: malicious, Browse
                            • Filename: PAGO.exe, Detection: malicious, Browse
                            • Filename: PAGO.exe, Detection: malicious, Browse
                            • Filename: Obstetricated.exe, Detection: malicious, Browse
                            • Filename: Orden de compra.exe, Detection: malicious, Browse
                            • Filename: Orden de compra.exe, Detection: malicious, Browse
                            • Filename: Orden de compra.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....`...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:ASCII text, with very long lines (65536), with no line terminators
                            Category:dropped
                            Size (bytes):457024
                            Entropy (8bit):2.657648980780291
                            Encrypted:false
                            SSDEEP:1536:q9QYlyFgTDQ27YRJknuJpCrouPJezz3WvLuzBHeCswIX2diBo4z02gt/p3UEP5sa:aBJUcbZzqN7zh+syt1esyn24MGptl
                            MD5:3E65AB856E3180279BBD28D11CBBB8B2
                            SHA1:36BF6F2278D3EDF764C5D6F06FEE67251EF34C36
                            SHA-256:4B8EB25D2A1328E2FDEE9A1F7654F02DD18401643C82C36BA56C92ECAA769BCD
                            SHA-512:CB9ABA7BA1BD722FA82E2E7BF8A7BE6AE7D8DD56B599390AB26B14D7A27367284D8A4646A2634D671A5E65F422FB46DF473C065A532FB260DB473D69A2C1DF7C
                            Malicious:false
                            Reputation:low
                            Preview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
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):214005
                            Entropy (8bit):7.5415932130722165
                            Encrypted:false
                            SSDEEP:6144:rphX8N6JOmQClcEjFK/FPpQP3JwCmzBXWdkD9:rq64DgRjo/3c3JwtBXEu
                            MD5:2137D24C988EC559DA788C41A4F5235C
                            SHA1:59BDC7C8B86ADCC1EBB44C9E71954EAB87BA8C3D
                            SHA-256:74779ACCBD7DD2E132B02DA893F6BFC1D54E7AB601F209CD6DD831E5B614D055
                            SHA-512:D212C5F7ECA211EC963A29448AFEE01D98A0E4428D082E4E4D6E96344F24849398F243E0180DCC37B79F5415BBC4F56D170891AC58059B69EE6105F7A60C9E91
                            Malicious:false
                            Reputation:low
                            Preview:..EE.~..........e.:......[.T............''''...FF..................MM.....................::..FF...........s.hh.666......v.22........PPPP..2.........wwww.....!!.U.........@@................%%%.............}}}}}........i......EE........NN.......?????...O.,...../...........................8..%......k......Z.99........9........||||............UU...kkk.44.....y..............K......?............................................;..11.........[...@@.x.%...Q...........FFF............S........3..................OO.....................................n.................}}.........$...tttt........ccc...~~~..r.4...................ppppp............EE........``.R...............N........................7.........WW.........D.....4........rrr.........................dddd.....................Q............B......--.VV.........t...vv.............F.\\..$...........!..........uuu.....T.........77.......>>.....-.......Q...................x.88888....................[[.................................!!........
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):442363
                            Entropy (8bit):1.2533707838755617
                            Encrypted:false
                            SSDEEP:1536:f6KFImN7hPg1fMcZ9pkK6m1rmkrDAji7VW9EgfrY:PyMtabPE+7ctfM
                            MD5:5465B75724C031B21C018F7D72941F72
                            SHA1:98176B27A41A35401A96D0AAC0859EEC25A4C5FE
                            SHA-256:7390780C6FB1F7B57C950A11AE287127CB6144CE9AD1C26E8C242BADB685729B
                            SHA-512:7084191B13FF854943DEE9FB6DDC1D7F89D06055FF4DA7E04DA1C359B557AC22762209B8DFE061F3AF628DF077E1D1D1009E9F9A18E3C9441AEE7FD4FDFF1688
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:.........................................................................|......................................v..g..................................................................C...........`.......................................... ...............#.....................K..0.................\................................4.......................................y...................."........k..............9.H.................................................................."...........m............................6...................................................E..)..........[..............TZ..............Q............_...........$...... ..........................W....................................................y..................................q......!.................................... .....................o..........*........................................................................[..............9..................s....;..........................................
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):521
                            Entropy (8bit):4.284169749449499
                            Encrypted:false
                            SSDEEP:12:7+SriF8i+WUQDJBYqRIE47W0BvM71ARi9ulhji4JDQCr6K:7tuZ+d6/GEUI18jhJsCr6K
                            MD5:B089BD0CBC944DE0B1023E6CE9318BD3
                            SHA1:715FA74E243D5C3419519E7371ED1836C9BCFA4A
                            SHA-256:1E8ABB4A5E85595B0EF2FC73E9012EDDFE1BCB7363E90A2EA46F561DD3742F93
                            SHA-512:A164EB2AB02E612E9F96531006C4A71B8D6E8EA6444D86907CB15EF2C1AAB4680EAF3BB580C6A1D5B89A3F454F3E532242FC1DE2B71A9FFF56F812F6E4638885
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:dibasic skinnebenssaarenes rembrandt unembayed timerne ependytes overtorturing.ruskindenes cellemembranen visirs daarligste bartholomeuss eslabon trflen communizations karikaturtegners forsgsstadiet hillocked..perfumers afplukker simonized jubilumsmiddags dolktids spokane milliontedel indfoertes dour..margented pomerans semicylindrical skifferolies kernerelationerne univalent,tiltrdelsesforelsning hydrion caggy stabejserne figurist vt klutzier bendy hanekamme..duilin molompi cuartino fornagl tortricoidea unhurrying.
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):485127
                            Entropy (8bit):1.2565961974341746
                            Encrypted:false
                            SSDEEP:768:bgBMgq+aLnwfPnz/Km1iLGyDPiU55NCk+T93YpnK77oTpvYP3knePjlW0kwNGL+q:XQ3wvosOsCpxFJrXSBmHzTu58UR
                            MD5:580D05E679E74B036B55CA8E5FF32769
                            SHA1:10175C43AB7B725FFFCF770EB2C3555E91D3BA13
                            SHA-256:B3E34975017C193D4672BEC42BC52B55F8AE1F1D5F30D56DCFD0B3A4242C3BE4
                            SHA-512:0E26F0084BED372785A5E8C8BE3A0717074AA52C2E8B5413FA9F2CB8DEED40BF8BDBF15C411EFFA432A8B96E50AE6085E8F90A97350827AFAA1BE1AB4B3E1643
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:.................3.........................................=.....................................`.............................................................................n........................... .L.........................(,.b...e.......\...............................u.....................[.............................n........................[........................................c...........................W...........................................................*..].h.............R..............................................*............................^.....$.....w...................................................p...............................................................$.t...................................w*....................b....E.......................|.............5.......E................................................P.........d..................vl...........}..."..................................1.............................k.....7...............
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):389868
                            Entropy (8bit):1.2469892412772452
                            Encrypted:false
                            SSDEEP:768:8mGX5iY6YFC1hSNYG8n6aCKBHwcX7e3ZNrt7qNIxKpGEopKfWOO72cDEDQ+7IF5i:m5ittaAwW6q8KH13QyOgs2w
                            MD5:2A500E1219C4894E2D45C32C5A5A11FD
                            SHA1:AC9A88DE4C84E1EB8A535E1061CBC6584380D24E
                            SHA-256:C65F223375C6DFE8CE71213D5DD24F39CDE31F772D2C66521BF07B21BE45E6C1
                            SHA-512:89ED91AF91CF969FE7EC087EE107B52959582615EFB2AB72A21D6C3820E5BDDA78EE02EB39BB323FD996D85510627387616DF8917B12052A62D288D8E9448596
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:...........................E.....................................................................<......................].....f........................_...G..........S....................................@...............j...................................................I...................|..C..........................................................d......%t..........N..................d...Q...........p....3..........................................L...........y...............................-........................................................................@.........]..3........A................................*............................................................................................@...........(............................{..4......................................k.................{.....................W.................,......+...............K....b.......................!.............................H..)..........................E..........................
                            Process:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                            Category:modified
                            Size (bytes):754
                            Entropy (8bit):3.3027259102800293
                            Encrypted:false
                            SSDEEP:12:8wl0dsXMlykXuGlnEElkXOEOqkXu3w/g/jNJkKAp4t2YZ/elFlSJm:8OrWvlX3qw/4hHAzqy
                            MD5:4CF5311D4D3C7F8529A7444A1BDE92AC
                            SHA1:87C97FA322DAB6719FE9111565D34D4849833FF0
                            SHA-256:32B62B1DB267EB609645F136E4D54B38A04D9246C7AEBC2DD9DB4BA5D3213616
                            SHA-512:4F3921FFC4E0DF7DEB2E8AF4BC2C9B4D1645829BFBB205FB22E159AC0234F68DA7A38C8A23DC772DEADF135425B369F11EECAB0A7E69FB8E62C53F7E5B171E1E
                            Malicious:false
                            Preview:L..................F........................................................G....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....l.2...........Disannex.And37..N............................................D.i.s.a.n.n.e.x...A.n.d.3.7.......!.....\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.D.i.s.a.n.n.e.x...A.n.d.3.7.'.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.t.r.a.n.c.h.e.t.\.T.r.y.k.m.a.a.l.e.r.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.547909639119886
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:LkzvfB4VFj.exe
                            File size:892'576 bytes
                            MD5:a5104b4d665dc081181fd163dce0bb77
                            SHA1:e72855a64aace2ecf6aa008942e443d2ac7508d7
                            SHA256:aa047fd2e21f33564c1178d063122fc9368afc5c6a5455c4381a3f5edde4b145
                            SHA512:0ea16a9731ee607e601e385b69b860a80b81455a1279df9b2e81f1e6b879454ca1dda8ddb5dce70d610d21f4e16eba6a4d289ea18da17d354c63d97180126507
                            SSDEEP:24576:DiGFaq43NvCkZsAFNgXDYRujTrl6foV0GSxnKSkAJ/QOeaI:DiGFu3Nv0AFTSd6foV0PxKSkAJ/qaI
                            TLSH:F81512B2F240E86AD8298F724C5ED142DBE5BE1869142B9F3FE67F1A7D71060C10F646
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L... ..`.................f...|......H3............@
                            Icon Hash:0e13672535353f1c
                            Entrypoint:0x403348
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x60FC9220 [Sat Jul 24 22:20:16 2021 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:ced282d9b261d1462772017fe2f6972b
                            Signature Valid:false
                            Signature Issuer:CN="Diaskopernes unboisterousness Lejemorderen ", E=Indaandendes6@Menubilledet.Gup, L=West Edmeston, S=New York, C=US
                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                            Error Number:-2146762487
                            Not Before, Not After
                            • 09/02/2024 12:49:35 08/02/2027 12:49:35
                            Subject Chain
                            • CN="Diaskopernes unboisterousness Lejemorderen ", E=Indaandendes6@Menubilledet.Gup, L=West Edmeston, S=New York, C=US
                            Version:3
                            Thumbprint MD5:23ECB3AE0DB84F37E645DFECF9E00369
                            Thumbprint SHA-1:7BBAA847C80C3FC9EEE3E7553C7728484F48024F
                            Thumbprint SHA-256:40A2C2D67EED47AD53A368EF27A455144F4D61004EB513B02F398F3D0BA70D20
                            Serial:09AF69515B952A9E5094BDF9D17A589BED2D6528
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 0040A198h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [004080B8h]
                            call dword ptr [004080BCh]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042F42Ch], eax
                            je 00007F80E8CE2973h
                            push ebx
                            call 00007F80E8CE5AD6h
                            cmp eax, ebx
                            je 00007F80E8CE2969h
                            push 00000C00h
                            call eax
                            mov esi, 004082A0h
                            push esi
                            call 00007F80E8CE5A52h
                            push esi
                            call dword ptr [004080CCh]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007F80E8CE294Dh
                            push 0000000Bh
                            call 00007F80E8CE5AAAh
                            push 00000009h
                            call 00007F80E8CE5AA3h
                            push 00000007h
                            mov dword ptr [0042F424h], eax
                            call 00007F80E8CE5A97h
                            cmp eax, ebx
                            je 00007F80E8CE2971h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F80E8CE2969h
                            or byte ptr [0042F42Fh], 00000040h
                            push ebp
                            call dword ptr [00408038h]
                            push ebx
                            call dword ptr [00408288h]
                            mov dword ptr [0042F4F8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 00429850h
                            call dword ptr [0040816Ch]
                            push 0040A188h
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x41dd0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0xd8aa80x13f8
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x300000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x580000x41dd00x41e0051f103b856396aac282c5bd5a24beff1False0.6063619248102466data5.8960782160116745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x583b80x130caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998410786148207
                            RT_ICON0x6b4880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.40775464332189754
                            RT_ICON0x7bcb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4554866512507883
                            RT_ICON0x851580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.462218045112782
                            RT_ICON0x8b9400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4729667282809612
                            RT_ICON0x90dc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.46835144071799717
                            RT_ICON0x94ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5149377593360995
                            RT_ICON0x975980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5457317073170732
                            RT_ICON0x986400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6073770491803279
                            RT_ICON0x98fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                            RT_DIALOG0x994300x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x995300x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x996500xc4dataEnglishUnited States0.5918367346938775
                            RT_DIALOG0x997180x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x997780x92Targa image data - Map 32 x 12490 x 1 +1EnglishUnited States0.7191780821917808
                            RT_VERSION0x998100x27cdataEnglishUnited States0.5
                            RT_MANIFEST0x99a900x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                            DLLImport
                            ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                            SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                            ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                            USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:08:12:19
                            Start date:08/11/2024
                            Path:C:\Users\user\Desktop\LkzvfB4VFj.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\LkzvfB4VFj.exe"
                            Imagebase:0x400000
                            File size:892'576 bytes
                            MD5 hash:A5104B4D665DC081181FD163DCE0BB77
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3734765818.0000000005D64000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:16.9%
                              Dynamic/Decrypted Code Coverage:14.5%
                              Signature Coverage:16.1%
                              Total number of Nodes:1550
                              Total number of Limit Nodes:50
                              execution_graph 5719 401d44 5720 402bac 17 API calls 5719->5720 5721 401d52 SetWindowLongA 5720->5721 5722 402a5a 5721->5722 4290 401ec5 4298 402bac 4290->4298 4292 401ecb 4293 402bac 17 API calls 4292->4293 4294 401ed7 4293->4294 4295 401ee3 ShowWindow 4294->4295 4296 401eee EnableWindow 4294->4296 4297 402a5a 4295->4297 4296->4297 4301 40618a 4298->4301 4300 402bc1 4300->4292 4316 406197 4301->4316 4302 4063b9 4303 4063ce 4302->4303 4334 4060f7 lstrcpynA 4302->4334 4303->4300 4305 406393 lstrlenA 4305->4316 4306 40618a 10 API calls 4306->4305 4309 4062af GetSystemDirectoryA 4309->4316 4311 4062c2 GetWindowsDirectoryA 4311->4316 4313 40618a 10 API calls 4313->4316 4314 40633c lstrcatA 4314->4316 4315 4062f6 SHGetSpecialFolderLocation 4315->4316 4317 40630e SHGetPathFromIDListA CoTaskMemFree 4315->4317 4316->4302 4316->4305 4316->4306 4316->4309 4316->4311 4316->4313 4316->4314 4316->4315 4318 405fde 4316->4318 4323 4063d2 4316->4323 4332 406055 wsprintfA 4316->4332 4333 4060f7 lstrcpynA 4316->4333 4317->4316 4335 405f7d 4318->4335 4321 406012 RegQueryValueExA RegCloseKey 4322 406041 4321->4322 4322->4316 4330 4063de 4323->4330 4324 40644a CharPrevA 4328 406446 4324->4328 4325 40643b CharNextA 4325->4328 4325->4330 4326 406465 4326->4316 4328->4324 4328->4326 4329 406429 CharNextA 4329->4330 4330->4325 4330->4328 4330->4329 4331 406436 CharNextA 4330->4331 4339 405aba 4330->4339 4331->4325 4332->4316 4333->4316 4334->4303 4336 405f8c 4335->4336 4337 405f90 4336->4337 4338 405f95 RegOpenKeyExA 4336->4338 4337->4321 4337->4322 4338->4337 4340 405ac0 4339->4340 4341 405ad3 4340->4341 4342 405ac6 CharNextA 4340->4342 4341->4330 4342->4340 4343 401746 4349 402bce 4343->4349 4347 401754 4348 405cbf 2 API calls 4347->4348 4348->4347 4350 402bda 4349->4350 4351 40618a 17 API calls 4350->4351 4352 402bfb 4351->4352 4353 40174d 4352->4353 4354 4063d2 5 API calls 4352->4354 4355 405cbf 4353->4355 4354->4353 4356 405cca GetTickCount GetTempFileNameA 4355->4356 4357 405cfb 4356->4357 4358 405cf7 4356->4358 4357->4347 4358->4356 4358->4357 5858 4045c6 5859 4045d6 5858->5859 5860 4045fc 5858->5860 5861 40417b 18 API calls 5859->5861 5862 4041e2 8 API calls 5860->5862 5863 4045e3 SetDlgItemTextA 5861->5863 5864 404608 5862->5864 5863->5860 5723 401947 5724 402bce 17 API calls 5723->5724 5725 40194e lstrlenA 5724->5725 5726 402620 5725->5726 4359 403348 SetErrorMode GetVersion 4360 403389 4359->4360 4361 40338f 4359->4361 4362 406500 5 API calls 4360->4362 4449 406492 GetSystemDirectoryA 4361->4449 4362->4361 4364 4033a5 lstrlenA 4364->4361 4365 4033b4 4364->4365 4452 406500 GetModuleHandleA 4365->4452 4368 406500 5 API calls 4369 4033c2 4368->4369 4370 406500 5 API calls 4369->4370 4371 4033ce #17 OleInitialize SHGetFileInfoA 4370->4371 4458 4060f7 lstrcpynA 4371->4458 4374 40341a GetCommandLineA 4459 4060f7 lstrcpynA 4374->4459 4376 40342c 4377 405aba CharNextA 4376->4377 4378 403455 CharNextA 4377->4378 4386 403465 4378->4386 4379 40352f 4380 403542 GetTempPathA 4379->4380 4460 403317 4380->4460 4382 40355a 4384 4035b4 DeleteFileA 4382->4384 4385 40355e GetWindowsDirectoryA lstrcatA 4382->4385 4383 405aba CharNextA 4383->4386 4470 402ea1 GetTickCount GetModuleFileNameA 4384->4470 4387 403317 12 API calls 4385->4387 4386->4379 4386->4383 4390 403531 4386->4390 4389 40357a 4387->4389 4389->4384 4392 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4389->4392 4555 4060f7 lstrcpynA 4390->4555 4391 4035c8 4398 405aba CharNextA 4391->4398 4431 40364e 4391->4431 4444 40365e 4391->4444 4394 403317 12 API calls 4392->4394 4396 4035ac 4394->4396 4396->4384 4396->4444 4400 4035e3 4398->4400 4406 403629 4400->4406 4407 40368e 4400->4407 4401 403796 4403 403818 ExitProcess 4401->4403 4404 40379e GetCurrentProcess OpenProcessToken 4401->4404 4402 403678 4579 405813 4402->4579 4409 4037e9 4404->4409 4410 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 4404->4410 4556 405b7d 4406->4556 4583 40577e 4407->4583 4414 406500 5 API calls 4409->4414 4410->4409 4417 4037f0 4414->4417 4420 403805 ExitWindowsEx 4417->4420 4423 403811 4417->4423 4418 4036a4 lstrcatA 4419 4036af lstrcatA lstrcmpiA 4418->4419 4422 4036cb 4419->4422 4419->4444 4420->4403 4420->4423 4425 4036d0 4422->4425 4426 4036d7 4422->4426 4603 40140b 4423->4603 4424 403643 4571 4060f7 lstrcpynA 4424->4571 4586 4056e4 CreateDirectoryA 4425->4586 4591 405761 CreateDirectoryA 4426->4591 4498 40390a 4431->4498 4433 4036dc SetCurrentDirectoryA 4434 4036f6 4433->4434 4435 4036eb 4433->4435 4595 4060f7 lstrcpynA 4434->4595 4594 4060f7 lstrcpynA 4435->4594 4438 40618a 17 API calls 4439 403735 DeleteFileA 4438->4439 4440 403742 CopyFileA 4439->4440 4446 403704 4439->4446 4440->4446 4441 40378a 4442 405ed6 36 API calls 4441->4442 4442->4444 4572 403830 4444->4572 4445 40618a 17 API calls 4445->4446 4446->4438 4446->4441 4446->4445 4448 403776 CloseHandle 4446->4448 4596 405ed6 MoveFileExA 4446->4596 4600 405796 CreateProcessA 4446->4600 4448->4446 4450 4064b4 wsprintfA LoadLibraryExA 4449->4450 4450->4364 4453 406526 GetProcAddress 4452->4453 4454 40651c 4452->4454 4455 4033bb 4453->4455 4456 406492 3 API calls 4454->4456 4455->4368 4457 406522 4456->4457 4457->4453 4457->4455 4458->4374 4459->4376 4461 4063d2 5 API calls 4460->4461 4463 403323 4461->4463 4462 40332d 4462->4382 4463->4462 4606 405a8f lstrlenA CharPrevA 4463->4606 4466 405761 2 API calls 4467 40333b 4466->4467 4468 405cbf 2 API calls 4467->4468 4469 403346 4468->4469 4469->4382 4609 405c90 GetFileAttributesA CreateFileA 4470->4609 4472 402ee1 4492 402ef1 4472->4492 4610 4060f7 lstrcpynA 4472->4610 4474 402f07 4611 405ad6 lstrlenA 4474->4611 4478 402f18 GetFileSize 4479 403012 4478->4479 4495 402f2f 4478->4495 4616 402e3d 4479->4616 4481 40301b 4483 40304b GlobalAlloc 4481->4483 4481->4492 4651 403300 SetFilePointer 4481->4651 4627 403300 SetFilePointer 4483->4627 4484 40307e 4489 402e3d 6 API calls 4484->4489 4487 403034 4490 4032ea ReadFile 4487->4490 4488 403066 4628 4030d8 4488->4628 4489->4492 4493 40303f 4490->4493 4492->4391 4493->4483 4493->4492 4494 402e3d 6 API calls 4494->4495 4495->4479 4495->4484 4495->4492 4495->4494 4648 4032ea 4495->4648 4496 403072 4496->4492 4496->4496 4497 4030af SetFilePointer 4496->4497 4497->4492 4499 406500 5 API calls 4498->4499 4500 40391e 4499->4500 4501 403924 4500->4501 4502 403936 4500->4502 4680 406055 wsprintfA 4501->4680 4503 405fde 3 API calls 4502->4503 4504 403961 4503->4504 4506 40397f lstrcatA 4504->4506 4508 405fde 3 API calls 4504->4508 4507 403934 4506->4507 4672 403bcf 4507->4672 4508->4506 4511 405b7d 18 API calls 4512 4039b1 4511->4512 4513 403a3a 4512->4513 4515 405fde 3 API calls 4512->4515 4514 405b7d 18 API calls 4513->4514 4516 403a40 4514->4516 4517 4039dd 4515->4517 4518 403a50 LoadImageA 4516->4518 4519 40618a 17 API calls 4516->4519 4517->4513 4522 4039f9 lstrlenA 4517->4522 4525 405aba CharNextA 4517->4525 4520 403af6 4518->4520 4521 403a77 RegisterClassA 4518->4521 4519->4518 4524 40140b 2 API calls 4520->4524 4523 403aad SystemParametersInfoA CreateWindowExA 4521->4523 4553 403b00 4521->4553 4526 403a07 lstrcmpiA 4522->4526 4527 403a2d 4522->4527 4523->4520 4528 403afc 4524->4528 4529 4039f7 4525->4529 4526->4527 4530 403a17 GetFileAttributesA 4526->4530 4531 405a8f 3 API calls 4527->4531 4533 403bcf 18 API calls 4528->4533 4528->4553 4529->4522 4532 403a23 4530->4532 4534 403a33 4531->4534 4532->4527 4536 405ad6 2 API calls 4532->4536 4537 403b0d 4533->4537 4681 4060f7 lstrcpynA 4534->4681 4536->4527 4538 403b19 ShowWindow 4537->4538 4539 403b9c 4537->4539 4540 406492 3 API calls 4538->4540 4682 4052f0 OleInitialize 4539->4682 4542 403b31 4540->4542 4544 403b3f GetClassInfoA 4542->4544 4547 406492 3 API calls 4542->4547 4543 403ba2 4545 403ba6 4543->4545 4546 403bbe 4543->4546 4549 403b53 GetClassInfoA RegisterClassA 4544->4549 4550 403b69 DialogBoxParamA 4544->4550 4551 40140b 2 API calls 4545->4551 4545->4553 4548 40140b 2 API calls 4546->4548 4547->4544 4548->4553 4549->4550 4552 40140b 2 API calls 4550->4552 4551->4553 4554 403b91 4552->4554 4553->4444 4554->4553 4555->4380 4700 4060f7 lstrcpynA 4556->4700 4558 405b8e 4701 405b28 CharNextA CharNextA 4558->4701 4561 403634 4561->4444 4570 4060f7 lstrcpynA 4561->4570 4562 4063d2 5 API calls 4568 405ba4 4562->4568 4563 405bcf lstrlenA 4564 405bda 4563->4564 4563->4568 4566 405a8f 3 API calls 4564->4566 4567 405bdf GetFileAttributesA 4566->4567 4567->4561 4568->4561 4568->4563 4569 405ad6 2 API calls 4568->4569 4707 40646b FindFirstFileA 4568->4707 4569->4563 4570->4424 4571->4431 4573 403848 4572->4573 4574 40383a CloseHandle 4572->4574 4710 403875 4573->4710 4574->4573 4581 405828 4579->4581 4580 403686 ExitProcess 4581->4580 4582 40583c MessageBoxIndirectA 4581->4582 4582->4580 4584 406500 5 API calls 4583->4584 4585 403693 lstrcatA 4584->4585 4585->4418 4585->4419 4587 4036d5 4586->4587 4588 405735 GetLastError 4586->4588 4587->4433 4588->4587 4589 405744 SetFileSecurityA 4588->4589 4589->4587 4590 40575a GetLastError 4589->4590 4590->4587 4592 405771 4591->4592 4593 405775 GetLastError 4591->4593 4592->4433 4593->4592 4594->4434 4595->4446 4597 405ef7 4596->4597 4598 405eea 4596->4598 4597->4446 4767 405d66 4598->4767 4601 4057d5 4600->4601 4602 4057c9 CloseHandle 4600->4602 4601->4446 4602->4601 4604 401389 2 API calls 4603->4604 4605 401420 4604->4605 4605->4403 4607 403335 4606->4607 4608 405aa9 lstrcatA 4606->4608 4607->4466 4608->4607 4609->4472 4610->4474 4612 405ae3 4611->4612 4613 402f0d 4612->4613 4614 405ae8 CharPrevA 4612->4614 4615 4060f7 lstrcpynA 4613->4615 4614->4612 4614->4613 4615->4478 4617 402e46 4616->4617 4618 402e5e 4616->4618 4619 402e56 4617->4619 4620 402e4f DestroyWindow 4617->4620 4621 402e66 4618->4621 4622 402e6e GetTickCount 4618->4622 4619->4481 4620->4619 4652 40653c 4621->4652 4624 402e7c CreateDialogParamA ShowWindow 4622->4624 4625 402e9f 4622->4625 4624->4625 4625->4481 4627->4488 4629 4030ee 4628->4629 4630 40311c 4629->4630 4658 403300 SetFilePointer 4629->4658 4632 4032ea ReadFile 4630->4632 4633 403127 4632->4633 4634 403283 4633->4634 4635 403139 GetTickCount 4633->4635 4640 40326d 4633->4640 4636 4032c5 4634->4636 4641 403287 4634->4641 4637 403188 4635->4637 4635->4640 4639 4032ea ReadFile 4636->4639 4638 4032ea ReadFile 4637->4638 4637->4640 4644 4031de GetTickCount 4637->4644 4645 403203 MulDiv wsprintfA 4637->4645 4656 405d37 WriteFile 4637->4656 4638->4637 4639->4640 4640->4496 4641->4640 4642 4032ea ReadFile 4641->4642 4643 405d37 WriteFile 4641->4643 4642->4641 4643->4641 4644->4637 4659 40521e 4645->4659 4670 405d08 ReadFile 4648->4670 4651->4487 4653 406559 PeekMessageA 4652->4653 4654 402e6c 4653->4654 4655 40654f DispatchMessageA 4653->4655 4654->4481 4655->4653 4657 405d55 4656->4657 4657->4637 4658->4630 4660 405239 4659->4660 4669 4052dc 4659->4669 4661 405256 lstrlenA 4660->4661 4662 40618a 17 API calls 4660->4662 4663 405264 lstrlenA 4661->4663 4664 40527f 4661->4664 4662->4661 4665 405276 lstrcatA 4663->4665 4663->4669 4666 405292 4664->4666 4667 405285 SetWindowTextA 4664->4667 4665->4664 4668 405298 SendMessageA SendMessageA SendMessageA 4666->4668 4666->4669 4667->4666 4668->4669 4669->4637 4671 4032fd 4670->4671 4671->4495 4673 403be3 4672->4673 4689 406055 wsprintfA 4673->4689 4675 403c54 4690 403c88 4675->4690 4677 40398f 4677->4511 4678 403c59 4678->4677 4679 40618a 17 API calls 4678->4679 4679->4678 4680->4507 4681->4513 4693 4041c7 4682->4693 4684 40533a 4685 4041c7 SendMessageA 4684->4685 4686 40534c OleUninitialize 4685->4686 4686->4543 4687 405313 4687->4684 4696 401389 4687->4696 4689->4675 4691 40618a 17 API calls 4690->4691 4692 403c96 SetWindowTextA 4691->4692 4692->4678 4694 4041d0 SendMessageA 4693->4694 4695 4041df 4693->4695 4694->4695 4695->4687 4698 401390 4696->4698 4697 4013fe 4697->4687 4698->4697 4699 4013cb MulDiv SendMessageA 4698->4699 4699->4698 4700->4558 4702 405b43 4701->4702 4705 405b53 4701->4705 4704 405b4e CharNextA 4702->4704 4702->4705 4703 405b73 4703->4561 4703->4562 4704->4703 4705->4703 4706 405aba CharNextA 4705->4706 4706->4705 4708 406481 FindClose 4707->4708 4709 40648c 4707->4709 4708->4709 4709->4568 4711 403883 4710->4711 4712 40384d 4711->4712 4713 403888 FreeLibrary GlobalFree 4711->4713 4714 4058bf 4712->4714 4713->4712 4713->4713 4715 405b7d 18 API calls 4714->4715 4716 4058df 4715->4716 4717 4058e7 DeleteFileA 4716->4717 4719 4058fe 4716->4719 4718 403667 OleUninitialize 4717->4718 4718->4401 4718->4402 4720 405a2c 4719->4720 4754 4060f7 lstrcpynA 4719->4754 4720->4718 4725 40646b 2 API calls 4720->4725 4722 405924 4723 405937 4722->4723 4724 40592a lstrcatA 4722->4724 4727 405ad6 2 API calls 4723->4727 4726 40593d 4724->4726 4728 405a50 4725->4728 4729 40594b lstrcatA 4726->4729 4730 405956 lstrlenA FindFirstFileA 4726->4730 4727->4726 4728->4718 4731 405a54 4728->4731 4729->4730 4730->4720 4736 40597a 4730->4736 4732 405a8f 3 API calls 4731->4732 4734 405a5a 4732->4734 4733 405aba CharNextA 4733->4736 4735 405877 5 API calls 4734->4735 4737 405a66 4735->4737 4736->4733 4741 405a0b FindNextFileA 4736->4741 4750 4059cc 4736->4750 4755 4060f7 lstrcpynA 4736->4755 4738 405a80 4737->4738 4739 405a6a 4737->4739 4740 40521e 24 API calls 4738->4740 4739->4718 4744 40521e 24 API calls 4739->4744 4740->4718 4741->4736 4743 405a23 FindClose 4741->4743 4743->4720 4745 405a77 4744->4745 4746 405ed6 36 API calls 4745->4746 4748 405a7e 4746->4748 4748->4718 4749 4058bf 60 API calls 4749->4750 4750->4741 4750->4749 4751 40521e 24 API calls 4750->4751 4752 40521e 24 API calls 4750->4752 4753 405ed6 36 API calls 4750->4753 4756 405877 4750->4756 4751->4741 4752->4750 4753->4750 4754->4722 4755->4736 4764 405c6b GetFileAttributesA 4756->4764 4759 405892 RemoveDirectoryA 4762 4058a0 4759->4762 4760 40589a DeleteFileA 4760->4762 4761 4058a4 4761->4750 4762->4761 4763 4058b0 SetFileAttributesA 4762->4763 4763->4761 4765 405883 4764->4765 4766 405c7d SetFileAttributesA 4764->4766 4765->4759 4765->4760 4765->4761 4766->4765 4768 405db2 GetShortPathNameA 4767->4768 4769 405d8c 4767->4769 4771 405ed1 4768->4771 4772 405dc7 4768->4772 4794 405c90 GetFileAttributesA CreateFileA 4769->4794 4771->4597 4772->4771 4774 405dcf wsprintfA 4772->4774 4773 405d96 CloseHandle GetShortPathNameA 4773->4771 4776 405daa 4773->4776 4775 40618a 17 API calls 4774->4775 4777 405df7 4775->4777 4776->4768 4776->4771 4795 405c90 GetFileAttributesA CreateFileA 4777->4795 4779 405e04 4779->4771 4780 405e13 GetFileSize GlobalAlloc 4779->4780 4781 405e35 4780->4781 4782 405eca CloseHandle 4780->4782 4783 405d08 ReadFile 4781->4783 4782->4771 4784 405e3d 4783->4784 4784->4782 4796 405bf5 lstrlenA 4784->4796 4787 405e54 lstrcpyA 4790 405e76 4787->4790 4788 405e68 4789 405bf5 4 API calls 4788->4789 4789->4790 4791 405ead SetFilePointer 4790->4791 4792 405d37 WriteFile 4791->4792 4793 405ec3 GlobalFree 4792->4793 4793->4782 4794->4773 4795->4779 4797 405c36 lstrlenA 4796->4797 4798 405c3e 4797->4798 4799 405c0f lstrcmpiA 4797->4799 4798->4787 4798->4788 4799->4798 4800 405c2d CharNextA 4799->4800 4800->4797 5505 4038c8 5506 4038d3 5505->5506 5507 4038d7 5506->5507 5508 4038da GlobalAlloc 5506->5508 5508->5507 5865 401fcb 5866 402bce 17 API calls 5865->5866 5867 401fd2 5866->5867 5868 40646b 2 API calls 5867->5868 5869 401fd8 5868->5869 5871 401fea 5869->5871 5872 406055 wsprintfA 5869->5872 5872->5871 4822 4014d6 4823 402bac 17 API calls 4822->4823 4824 4014dc Sleep 4823->4824 4826 402a5a 4824->4826 4839 401759 4840 402bce 17 API calls 4839->4840 4841 401760 4840->4841 4842 401786 4841->4842 4843 40177e 4841->4843 4880 4060f7 lstrcpynA 4842->4880 4879 4060f7 lstrcpynA 4843->4879 4846 401784 4850 4063d2 5 API calls 4846->4850 4847 401791 4848 405a8f 3 API calls 4847->4848 4849 401797 lstrcatA 4848->4849 4849->4846 4873 4017a3 4850->4873 4851 4017e4 4853 405c6b 2 API calls 4851->4853 4852 40646b 2 API calls 4852->4873 4853->4873 4855 4017ba CompareFileTime 4855->4873 4856 40187e 4858 40521e 24 API calls 4856->4858 4857 401855 4859 40521e 24 API calls 4857->4859 4867 40186a 4857->4867 4861 401888 4858->4861 4859->4867 4860 4060f7 lstrcpynA 4860->4873 4862 4030d8 31 API calls 4861->4862 4863 40189b 4862->4863 4864 4018af SetFileTime 4863->4864 4865 4018c1 CloseHandle 4863->4865 4864->4865 4865->4867 4868 4018d2 4865->4868 4866 40618a 17 API calls 4866->4873 4869 4018d7 4868->4869 4870 4018ea 4868->4870 4871 40618a 17 API calls 4869->4871 4872 40618a 17 API calls 4870->4872 4874 4018df lstrcatA 4871->4874 4875 4018f2 4872->4875 4873->4851 4873->4852 4873->4855 4873->4856 4873->4857 4873->4860 4873->4866 4876 405813 MessageBoxIndirectA 4873->4876 4878 405c90 GetFileAttributesA CreateFileA 4873->4878 4874->4875 4875->4867 4877 405813 MessageBoxIndirectA 4875->4877 4876->4873 4877->4867 4878->4873 4879->4846 4880->4847 5727 401959 5728 402bac 17 API calls 5727->5728 5729 401960 5728->5729 5730 402bac 17 API calls 5729->5730 5731 40196d 5730->5731 5732 402bce 17 API calls 5731->5732 5733 401984 lstrlenA 5732->5733 5734 401994 5733->5734 5735 4019d4 5734->5735 5739 4060f7 lstrcpynA 5734->5739 5737 4019c4 5737->5735 5738 4019c9 lstrlenA 5737->5738 5738->5735 5739->5737 5309 701a1000 5312 701a101b 5309->5312 5319 701a14bb 5312->5319 5314 701a1020 5315 701a1027 GlobalAlloc 5314->5315 5316 701a1024 5314->5316 5315->5316 5317 701a14e2 3 API calls 5316->5317 5318 701a1019 5317->5318 5320 701a14c1 5319->5320 5321 701a14c7 5320->5321 5322 701a14d3 GlobalFree 5320->5322 5321->5314 5322->5314 5740 40535c 5741 405507 5740->5741 5742 40537e GetDlgItem GetDlgItem GetDlgItem 5740->5742 5743 40550f GetDlgItem CreateThread CloseHandle 5741->5743 5745 405537 5741->5745 5785 4041b0 SendMessageA 5742->5785 5743->5745 5747 405586 5745->5747 5748 40554d ShowWindow ShowWindow 5745->5748 5750 405565 5745->5750 5746 4053ee 5751 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5746->5751 5755 4041e2 8 API calls 5747->5755 5787 4041b0 SendMessageA 5748->5787 5749 4055c0 5749->5747 5758 4055cd SendMessageA 5749->5758 5750->5749 5753 405575 5750->5753 5754 405599 ShowWindow 5750->5754 5756 405463 5751->5756 5757 405447 SendMessageA SendMessageA 5751->5757 5759 404154 SendMessageA 5753->5759 5761 4055b9 5754->5761 5762 4055ab 5754->5762 5760 405592 5755->5760 5764 405476 5756->5764 5765 405468 SendMessageA 5756->5765 5757->5756 5758->5760 5766 4055e6 CreatePopupMenu 5758->5766 5759->5747 5763 404154 SendMessageA 5761->5763 5767 40521e 24 API calls 5762->5767 5763->5749 5769 40417b 18 API calls 5764->5769 5765->5764 5768 40618a 17 API calls 5766->5768 5767->5761 5770 4055f6 AppendMenuA 5768->5770 5771 405486 5769->5771 5772 405614 GetWindowRect 5770->5772 5773 405627 TrackPopupMenu 5770->5773 5774 4054c3 GetDlgItem SendMessageA 5771->5774 5775 40548f ShowWindow 5771->5775 5772->5773 5773->5760 5776 405643 5773->5776 5774->5760 5779 4054ea SendMessageA SendMessageA 5774->5779 5777 4054b2 5775->5777 5778 4054a5 ShowWindow 5775->5778 5780 405662 SendMessageA 5776->5780 5786 4041b0 SendMessageA 5777->5786 5778->5777 5779->5760 5780->5780 5781 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5780->5781 5783 4056a1 SendMessageA 5781->5783 5783->5783 5784 4056c3 GlobalUnlock SetClipboardData CloseClipboard 5783->5784 5784->5760 5785->5746 5786->5774 5787->5750 5788 40275d 5789 402763 5788->5789 5790 40276b FindClose 5789->5790 5791 402a5a 5789->5791 5790->5791 5323 401a5e 5324 402bac 17 API calls 5323->5324 5325 401a67 5324->5325 5326 402bac 17 API calls 5325->5326 5327 401a0e 5326->5327 5792 40495e 5793 40498a 5792->5793 5794 40496e 5792->5794 5795 404990 SHGetPathFromIDListA 5793->5795 5796 4049bd 5793->5796 5803 4057f7 GetDlgItemTextA 5794->5803 5798 4049a0 5795->5798 5799 4049a7 SendMessageA 5795->5799 5801 40140b 2 API calls 5798->5801 5799->5796 5800 40497b SendMessageA 5800->5793 5801->5799 5803->5800 5873 4029de 5874 406500 5 API calls 5873->5874 5875 4029e5 5874->5875 5876 402bce 17 API calls 5875->5876 5877 4029ee 5876->5877 5879 402a2a 5877->5879 5883 40614a 5877->5883 5880 4029fc 5880->5879 5887 406134 5880->5887 5884 406155 5883->5884 5885 406178 IIDFromString 5884->5885 5886 406171 5884->5886 5885->5880 5886->5880 5890 406119 WideCharToMultiByte 5887->5890 5889 402a1d CoTaskMemFree 5889->5879 5890->5889 5891 4027df 5892 402bce 17 API calls 5891->5892 5893 4027ed 5892->5893 5894 402803 5893->5894 5895 402bce 17 API calls 5893->5895 5896 405c6b 2 API calls 5894->5896 5895->5894 5897 402809 5896->5897 5919 405c90 GetFileAttributesA CreateFileA 5897->5919 5899 402816 5900 402822 GlobalAlloc 5899->5900 5901 4028bf 5899->5901 5902 4028b6 CloseHandle 5900->5902 5903 40283b 5900->5903 5904 4028c7 DeleteFileA 5901->5904 5905 4028da 5901->5905 5902->5901 5920 403300 SetFilePointer 5903->5920 5904->5905 5907 402841 5908 4032ea ReadFile 5907->5908 5909 40284a GlobalAlloc 5908->5909 5910 402894 5909->5910 5911 40285a 5909->5911 5913 405d37 WriteFile 5910->5913 5912 4030d8 31 API calls 5911->5912 5918 402867 5912->5918 5914 4028a0 GlobalFree 5913->5914 5915 4030d8 31 API calls 5914->5915 5917 4028b3 5915->5917 5916 40288b GlobalFree 5916->5910 5917->5902 5918->5916 5919->5899 5920->5907 5093 4023e0 5094 402bce 17 API calls 5093->5094 5095 4023f1 5094->5095 5096 402bce 17 API calls 5095->5096 5097 4023fa 5096->5097 5098 402bce 17 API calls 5097->5098 5099 402404 GetPrivateProfileStringA 5098->5099 5512 4028e0 5513 402bac 17 API calls 5512->5513 5514 4028e6 5513->5514 5515 402925 5514->5515 5516 40290e 5514->5516 5522 4027bf 5514->5522 5519 40293f 5515->5519 5520 40292f 5515->5520 5517 402922 5516->5517 5518 402913 5516->5518 5527 406055 wsprintfA 5517->5527 5526 4060f7 lstrcpynA 5518->5526 5521 40618a 17 API calls 5519->5521 5523 402bac 17 API calls 5520->5523 5521->5522 5523->5522 5526->5522 5527->5522 5328 701a1638 5329 701a1667 5328->5329 5330 701a1a98 18 API calls 5329->5330 5331 701a166e 5330->5331 5332 701a1681 5331->5332 5333 701a1675 5331->5333 5335 701a168b 5332->5335 5336 701a16a8 5332->5336 5334 701a1266 2 API calls 5333->5334 5337 701a167f 5334->5337 5338 701a14e2 3 API calls 5335->5338 5339 701a16ae 5336->5339 5340 701a16d2 5336->5340 5342 701a1690 5338->5342 5343 701a1559 3 API calls 5339->5343 5341 701a14e2 3 API calls 5340->5341 5341->5337 5344 701a1559 3 API calls 5342->5344 5345 701a16b3 5343->5345 5346 701a1696 5344->5346 5347 701a1266 2 API calls 5345->5347 5348 701a1266 2 API calls 5346->5348 5349 701a16b9 GlobalFree 5347->5349 5351 701a169c GlobalFree 5348->5351 5349->5337 5350 701a16cd GlobalFree 5349->5350 5350->5337 5351->5337 5804 401b63 5805 402bce 17 API calls 5804->5805 5806 401b6a 5805->5806 5807 402bac 17 API calls 5806->5807 5808 401b73 wsprintfA 5807->5808 5809 402a5a 5808->5809 5810 401d65 5811 401d78 GetDlgItem 5810->5811 5812 401d6b 5810->5812 5814 401d72 5811->5814 5813 402bac 17 API calls 5812->5813 5813->5814 5815 401db9 GetClientRect LoadImageA SendMessageA 5814->5815 5816 402bce 17 API calls 5814->5816 5818 401e1a 5815->5818 5820 401e26 5815->5820 5816->5815 5819 401e1f DeleteObject 5818->5819 5818->5820 5819->5820 5528 4042e6 5529 404408 5528->5529 5530 4042fc 5528->5530 5531 404477 5529->5531 5535 404541 5529->5535 5540 40444c GetDlgItem SendMessageA 5529->5540 5533 40417b 18 API calls 5530->5533 5532 404481 GetDlgItem 5531->5532 5531->5535 5534 4044ff 5532->5534 5539 404497 5532->5539 5536 404352 5533->5536 5534->5535 5544 404511 5534->5544 5538 4041e2 8 API calls 5535->5538 5537 40417b 18 API calls 5536->5537 5541 40435f CheckDlgButton 5537->5541 5542 40453c 5538->5542 5539->5534 5543 4044bd SendMessageA LoadCursorA SetCursor 5539->5543 5561 40419d EnableWindow 5540->5561 5559 40419d EnableWindow 5541->5559 5562 40458a 5543->5562 5548 404517 SendMessageA 5544->5548 5549 404528 5544->5549 5548->5549 5549->5542 5553 40452e SendMessageA 5549->5553 5550 404472 5554 404566 SendMessageA 5550->5554 5551 40437d GetDlgItem 5560 4041b0 SendMessageA 5551->5560 5553->5542 5554->5531 5556 404393 SendMessageA 5557 4043b1 GetSysColor 5556->5557 5558 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5556->5558 5557->5558 5558->5542 5559->5551 5560->5556 5561->5550 5565 4057d9 ShellExecuteExA 5562->5565 5564 4044f0 LoadCursorA SetCursor 5564->5534 5565->5564 5352 701a103d 5353 701a101b 5 API calls 5352->5353 5354 701a1056 5353->5354 5141 40166a 5142 402bce 17 API calls 5141->5142 5143 401671 5142->5143 5144 402bce 17 API calls 5143->5144 5145 40167a 5144->5145 5146 402bce 17 API calls 5145->5146 5147 401683 MoveFileA 5146->5147 5148 401696 5147->5148 5149 40168f 5147->5149 5150 40646b 2 API calls 5148->5150 5153 4022e2 5148->5153 5151 401423 24 API calls 5149->5151 5152 4016a5 5150->5152 5151->5153 5152->5153 5154 405ed6 36 API calls 5152->5154 5154->5149 5155 40216b 5156 402bce 17 API calls 5155->5156 5157 402172 5156->5157 5158 402bce 17 API calls 5157->5158 5159 40217c 5158->5159 5160 402bce 17 API calls 5159->5160 5161 402186 5160->5161 5162 402bce 17 API calls 5161->5162 5163 402193 5162->5163 5164 402bce 17 API calls 5163->5164 5165 40219d 5164->5165 5166 4021df CoCreateInstance 5165->5166 5167 402bce 17 API calls 5165->5167 5168 4022ac 5166->5168 5171 4021fe 5166->5171 5167->5166 5169 401423 24 API calls 5168->5169 5170 4022e2 5168->5170 5169->5170 5171->5168 5172 40228c MultiByteToWideChar 5171->5172 5172->5168 5566 4022eb 5567 402bce 17 API calls 5566->5567 5568 4022f1 5567->5568 5569 402bce 17 API calls 5568->5569 5570 4022fa 5569->5570 5571 402bce 17 API calls 5570->5571 5572 402303 5571->5572 5573 40646b 2 API calls 5572->5573 5574 40230c 5573->5574 5575 402310 5574->5575 5576 40231d lstrlenA lstrlenA 5574->5576 5577 40521e 24 API calls 5575->5577 5579 402318 5575->5579 5578 40521e 24 API calls 5576->5578 5577->5579 5580 402359 SHFileOperationA 5578->5580 5580->5575 5580->5579 5182 40266d 5183 402bac 17 API calls 5182->5183 5188 402677 5183->5188 5184 4026e5 5185 405d08 ReadFile 5185->5188 5186 4026e7 5191 406055 wsprintfA 5186->5191 5187 4026f7 5187->5184 5190 40270d SetFilePointer 5187->5190 5188->5184 5188->5185 5188->5186 5188->5187 5190->5184 5191->5184 5355 701a1837 5356 701a185a 5355->5356 5357 701a188a GlobalFree 5356->5357 5358 701a189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5356->5358 5357->5358 5359 701a1266 2 API calls 5358->5359 5360 701a1a1e GlobalFree GlobalFree 5359->5360 5821 40236d 5822 402374 5821->5822 5825 402387 5821->5825 5823 40618a 17 API calls 5822->5823 5824 402381 5823->5824 5824->5825 5826 405813 MessageBoxIndirectA 5824->5826 5826->5825 5921 4019ed 5922 402bce 17 API calls 5921->5922 5923 4019f4 5922->5923 5924 402bce 17 API calls 5923->5924 5925 4019fd 5924->5925 5926 401a04 lstrcmpiA 5925->5926 5927 401a16 lstrcmpA 5925->5927 5928 401a0a 5926->5928 5927->5928 5827 40296e 5828 402bac 17 API calls 5827->5828 5829 402974 5828->5829 5830 4029af 5829->5830 5831 4027bf 5829->5831 5833 402986 5829->5833 5830->5831 5832 40618a 17 API calls 5830->5832 5832->5831 5833->5831 5835 406055 wsprintfA 5833->5835 5835->5831 5581 4014f4 SetForegroundWindow 5582 402a5a 5581->5582 5240 402476 5241 402bce 17 API calls 5240->5241 5242 402488 5241->5242 5243 402bce 17 API calls 5242->5243 5244 402492 5243->5244 5257 402c5e 5244->5257 5247 402a5a 5248 4024c7 5251 402bac 17 API calls 5248->5251 5253 4024d3 5248->5253 5249 402bce 17 API calls 5250 4024c0 lstrlenA 5249->5250 5250->5248 5251->5253 5252 4024f5 RegSetValueExA 5255 40250b RegCloseKey 5252->5255 5253->5252 5254 4030d8 31 API calls 5253->5254 5254->5252 5255->5247 5258 402c79 5257->5258 5261 405fab 5258->5261 5262 405fba 5261->5262 5263 4024a2 5262->5263 5264 405fc5 RegCreateKeyExA 5262->5264 5263->5247 5263->5248 5263->5249 5264->5263 5836 402777 5837 40277d 5836->5837 5838 402781 FindNextFileA 5837->5838 5840 402793 5837->5840 5839 4027d2 5838->5839 5838->5840 5842 4060f7 lstrcpynA 5839->5842 5842->5840 5583 401ef9 5584 402bce 17 API calls 5583->5584 5585 401eff 5584->5585 5586 402bce 17 API calls 5585->5586 5587 401f08 5586->5587 5588 402bce 17 API calls 5587->5588 5589 401f11 5588->5589 5590 402bce 17 API calls 5589->5590 5591 401f1a 5590->5591 5592 401423 24 API calls 5591->5592 5593 401f21 5592->5593 5600 4057d9 ShellExecuteExA 5593->5600 5595 401f5c 5596 406575 5 API calls 5595->5596 5597 4027bf 5595->5597 5598 401f76 CloseHandle 5596->5598 5598->5597 5600->5595 5265 701a2921 5266 701a2971 5265->5266 5267 701a2931 VirtualProtect 5265->5267 5267->5266 5268 401f7b 5269 402bce 17 API calls 5268->5269 5270 401f81 5269->5270 5271 40521e 24 API calls 5270->5271 5272 401f8b 5271->5272 5273 405796 2 API calls 5272->5273 5274 401f91 5273->5274 5275 401fb2 CloseHandle 5274->5275 5278 4027bf 5274->5278 5283 406575 WaitForSingleObject 5274->5283 5275->5278 5279 401fa6 5280 401fb4 5279->5280 5281 401fab 5279->5281 5280->5275 5288 406055 wsprintfA 5281->5288 5284 40658f 5283->5284 5285 4065a1 GetExitCodeProcess 5284->5285 5286 40653c 2 API calls 5284->5286 5285->5279 5287 406596 WaitForSingleObject 5286->5287 5287->5284 5288->5275 5929 401ffb 5930 402bce 17 API calls 5929->5930 5931 402002 5930->5931 5932 406500 5 API calls 5931->5932 5933 402011 5932->5933 5934 402029 GlobalAlloc 5933->5934 5935 402091 5933->5935 5934->5935 5936 40203d 5934->5936 5937 406500 5 API calls 5936->5937 5938 402044 5937->5938 5939 406500 5 API calls 5938->5939 5940 40204e 5939->5940 5940->5935 5944 406055 wsprintfA 5940->5944 5942 402085 5945 406055 wsprintfA 5942->5945 5944->5942 5945->5935 5601 4018fd 5602 401934 5601->5602 5603 402bce 17 API calls 5602->5603 5604 401939 5603->5604 5605 4058bf 67 API calls 5604->5605 5606 401942 5605->5606 5361 401000 5362 401037 BeginPaint GetClientRect 5361->5362 5363 40100c DefWindowProcA 5361->5363 5365 4010f3 5362->5365 5366 401179 5363->5366 5367 401073 CreateBrushIndirect FillRect DeleteObject 5365->5367 5368 4010fc 5365->5368 5367->5365 5369 401102 CreateFontIndirectA 5368->5369 5370 401167 EndPaint 5368->5370 5369->5370 5371 401112 6 API calls 5369->5371 5370->5366 5371->5370 5372 701a225a 5373 701a22c4 5372->5373 5374 701a22cf GlobalAlloc 5373->5374 5375 701a22ee 5373->5375 5374->5373 5843 401900 5844 402bce 17 API calls 5843->5844 5845 401907 5844->5845 5846 405813 MessageBoxIndirectA 5845->5846 5847 401910 5846->5847 5946 404b80 GetDlgItem GetDlgItem 5947 404bd6 7 API calls 5946->5947 5953 404dfd 5946->5953 5948 404c72 SendMessageA 5947->5948 5949 404c7e DeleteObject 5947->5949 5948->5949 5950 404c89 5949->5950 5952 404cc0 5950->5952 5954 40618a 17 API calls 5950->5954 5951 404edf 5956 404f8b 5951->5956 5966 404f38 SendMessageA 5951->5966 5989 404df0 5951->5989 5955 40417b 18 API calls 5952->5955 5953->5951 5957 404e6c 5953->5957 6000 404ace SendMessageA 5953->6000 5960 404ca2 SendMessageA SendMessageA 5954->5960 5961 404cd4 5955->5961 5958 404f95 SendMessageA 5956->5958 5959 404f9d 5956->5959 5957->5951 5962 404ed1 SendMessageA 5957->5962 5958->5959 5968 404fb6 5959->5968 5969 404faf ImageList_Destroy 5959->5969 5981 404fc6 5959->5981 5960->5950 5965 40417b 18 API calls 5961->5965 5962->5951 5963 4041e2 8 API calls 5967 40518b 5963->5967 5970 404ce5 5965->5970 5972 404f4d SendMessageA 5966->5972 5966->5989 5973 404fbf GlobalFree 5968->5973 5968->5981 5969->5968 5974 404dbf GetWindowLongA SetWindowLongA 5970->5974 5980 404d37 SendMessageA 5970->5980 5983 404dba 5970->5983 5986 404d75 SendMessageA 5970->5986 5987 404d89 SendMessageA 5970->5987 5971 40513f 5976 405151 ShowWindow GetDlgItem ShowWindow 5971->5976 5971->5989 5975 404f60 5972->5975 5973->5981 5977 404dd8 5974->5977 5982 404f71 SendMessageA 5975->5982 5976->5989 5978 404df5 5977->5978 5979 404ddd ShowWindow 5977->5979 5999 4041b0 SendMessageA 5978->5999 5998 4041b0 SendMessageA 5979->5998 5980->5970 5981->5971 5993 405001 5981->5993 6005 404b4e 5981->6005 5982->5956 5983->5974 5983->5977 5986->5970 5987->5970 5989->5963 5990 40510b 5991 405115 InvalidateRect 5990->5991 5994 405121 5990->5994 5991->5994 5992 40502f SendMessageA 5997 405045 5992->5997 5993->5992 5993->5997 5994->5971 5995 404a89 20 API calls 5994->5995 5995->5971 5996 4050b9 SendMessageA SendMessageA 5996->5997 5997->5990 5997->5996 5998->5989 5999->5953 6001 404af1 GetMessagePos ScreenToClient SendMessageA 6000->6001 6002 404b2d SendMessageA 6000->6002 6003 404b25 6001->6003 6004 404b2a 6001->6004 6002->6003 6003->5957 6004->6002 6014 4060f7 lstrcpynA 6005->6014 6007 404b61 6015 406055 wsprintfA 6007->6015 6009 404b6b 6010 40140b 2 API calls 6009->6010 6011 404b74 6010->6011 6016 4060f7 lstrcpynA 6011->6016 6013 404b7b 6013->5993 6014->6007 6015->6009 6016->6013 5376 701a1058 5378 701a1074 5376->5378 5377 701a10dc 5378->5377 5379 701a14bb GlobalFree 5378->5379 5380 701a1091 5378->5380 5379->5380 5381 701a14bb GlobalFree 5380->5381 5382 701a10a1 5381->5382 5383 701a10a8 GlobalSize 5382->5383 5384 701a10b1 5382->5384 5383->5384 5385 701a10c6 5384->5385 5386 701a10b5 GlobalAlloc 5384->5386 5388 701a10d1 GlobalFree 5385->5388 5387 701a14e2 3 API calls 5386->5387 5387->5385 5388->5377 5848 401502 5849 40150a 5848->5849 5850 40151d 5848->5850 5851 402bac 17 API calls 5849->5851 5851->5850 5389 402604 5390 402bce 17 API calls 5389->5390 5391 40260b 5390->5391 5394 405c90 GetFileAttributesA CreateFileA 5391->5394 5393 402617 5394->5393 6017 401b87 6018 401b94 6017->6018 6019 401bd8 6017->6019 6026 401c1c 6018->6026 6027 401bab 6018->6027 6020 401c01 GlobalAlloc 6019->6020 6021 401bdc 6019->6021 6023 40618a 17 API calls 6020->6023 6030 402387 6021->6030 6038 4060f7 lstrcpynA 6021->6038 6022 40618a 17 API calls 6025 402381 6022->6025 6023->6026 6025->6030 6031 405813 MessageBoxIndirectA 6025->6031 6026->6022 6026->6030 6036 4060f7 lstrcpynA 6027->6036 6028 401bee GlobalFree 6028->6030 6031->6030 6032 401bba 6037 4060f7 lstrcpynA 6032->6037 6034 401bc9 6039 4060f7 lstrcpynA 6034->6039 6036->6032 6037->6034 6038->6028 6039->6030 4801 402588 4813 402c0e 4801->4813 4804 402bac 17 API calls 4805 40259b 4804->4805 4806 4025a9 4805->4806 4811 4027bf 4805->4811 4807 4025c2 RegEnumValueA 4806->4807 4808 4025b6 RegEnumKeyA 4806->4808 4809 4025de RegCloseKey 4807->4809 4810 4025d7 4807->4810 4808->4809 4809->4811 4810->4809 4814 402bce 17 API calls 4813->4814 4815 402c25 4814->4815 4816 405f7d RegOpenKeyExA 4815->4816 4817 402592 4816->4817 4817->4804 4818 401389 4820 401390 4818->4820 4819 4013fe 4820->4819 4821 4013cb MulDiv SendMessageA 4820->4821 4821->4820 6040 701a15d1 6041 701a14bb GlobalFree 6040->6041 6043 701a15e9 6041->6043 6042 701a162f GlobalFree 6043->6042 6044 701a1604 6043->6044 6045 701a161b VirtualFree 6043->6045 6044->6042 6045->6042 5395 40460d 5396 404639 5395->5396 5397 40464a 5395->5397 5456 4057f7 GetDlgItemTextA 5396->5456 5399 404656 GetDlgItem 5397->5399 5405 4046b5 5397->5405 5402 40466a 5399->5402 5400 404799 5454 404943 5400->5454 5461 4057f7 GetDlgItemTextA 5400->5461 5401 404644 5403 4063d2 5 API calls 5401->5403 5404 40467e SetWindowTextA 5402->5404 5408 405b28 4 API calls 5402->5408 5403->5397 5457 40417b 5404->5457 5405->5400 5410 40618a 17 API calls 5405->5410 5405->5454 5413 404674 5408->5413 5415 404729 SHBrowseForFolderA 5410->5415 5411 4047c9 5416 405b7d 18 API calls 5411->5416 5413->5404 5420 405a8f 3 API calls 5413->5420 5414 40469a 5417 40417b 18 API calls 5414->5417 5415->5400 5418 404741 CoTaskMemFree 5415->5418 5419 4047cf 5416->5419 5421 4046a8 5417->5421 5422 405a8f 3 API calls 5418->5422 5462 4060f7 lstrcpynA 5419->5462 5420->5404 5460 4041b0 SendMessageA 5421->5460 5424 40474e 5422->5424 5427 404785 SetDlgItemTextA 5424->5427 5431 40618a 17 API calls 5424->5431 5426 4046ae 5429 406500 5 API calls 5426->5429 5427->5400 5428 4047e6 5430 406500 5 API calls 5428->5430 5429->5405 5432 4047ed 5430->5432 5434 40476d lstrcmpiA 5431->5434 5433 404829 5432->5433 5442 405ad6 2 API calls 5432->5442 5443 404881 5432->5443 5463 4060f7 lstrcpynA 5433->5463 5434->5427 5435 40477e lstrcatA 5434->5435 5435->5427 5437 404830 5438 405b28 4 API calls 5437->5438 5439 404836 GetDiskFreeSpaceA 5438->5439 5441 40485a MulDiv 5439->5441 5439->5443 5441->5443 5442->5432 5444 4048f2 5443->5444 5464 404a89 5443->5464 5445 404915 5444->5445 5447 40140b 2 API calls 5444->5447 5475 40419d EnableWindow 5445->5475 5447->5445 5450 4048f4 SetDlgItemTextA 5450->5444 5451 4048e4 5467 4049c4 5451->5467 5452 404931 5452->5454 5476 404566 5452->5476 5479 4041e2 5454->5479 5456->5401 5458 40618a 17 API calls 5457->5458 5459 404186 SetDlgItemTextA 5458->5459 5459->5414 5460->5426 5461->5411 5462->5428 5463->5437 5465 4049c4 20 API calls 5464->5465 5466 4048df 5465->5466 5466->5450 5466->5451 5468 4049da 5467->5468 5469 40618a 17 API calls 5468->5469 5470 404a3e 5469->5470 5471 40618a 17 API calls 5470->5471 5472 404a49 5471->5472 5473 40618a 17 API calls 5472->5473 5474 404a5f lstrlenA wsprintfA SetDlgItemTextA 5473->5474 5474->5444 5475->5452 5477 404574 5476->5477 5478 404579 SendMessageA 5476->5478 5477->5478 5478->5454 5480 4042a5 5479->5480 5481 4041fa GetWindowLongA 5479->5481 5481->5480 5482 40420f 5481->5482 5482->5480 5483 40423c GetSysColor 5482->5483 5484 40423f 5482->5484 5483->5484 5485 404245 SetTextColor 5484->5485 5486 40424f SetBkMode 5484->5486 5485->5486 5487 404267 GetSysColor 5486->5487 5488 40426d 5486->5488 5487->5488 5489 404274 SetBkColor 5488->5489 5490 40427e 5488->5490 5489->5490 5490->5480 5491 404291 DeleteObject 5490->5491 5492 404298 CreateBrushIndirect 5490->5492 5491->5492 5492->5480 5607 401490 5608 40521e 24 API calls 5607->5608 5609 401497 5608->5609 6046 405192 6047 4051a2 6046->6047 6048 4051b6 6046->6048 6050 4051ff 6047->6050 6051 4051a8 6047->6051 6049 4051be IsWindowVisible 6048->6049 6057 4051d5 6048->6057 6049->6050 6052 4051cb 6049->6052 6053 405204 CallWindowProcA 6050->6053 6054 4041c7 SendMessageA 6051->6054 6056 404ace 5 API calls 6052->6056 6055 4051b2 6053->6055 6054->6055 6056->6057 6057->6053 6058 404b4e 4 API calls 6057->6058 6058->6050 4827 402516 4828 402c0e 17 API calls 4827->4828 4829 402520 4828->4829 4830 402bce 17 API calls 4829->4830 4831 402529 4830->4831 4832 402533 RegQueryValueExA 4831->4832 4835 4027bf 4831->4835 4833 402559 RegCloseKey 4832->4833 4834 402553 4832->4834 4833->4835 4834->4833 4838 406055 wsprintfA 4834->4838 4838->4833 4881 40239c 4882 4023a4 4881->4882 4883 4023aa 4881->4883 4884 402bce 17 API calls 4882->4884 4885 402bce 17 API calls 4883->4885 4886 4023ba 4883->4886 4884->4883 4885->4886 4887 4023c8 4886->4887 4888 402bce 17 API calls 4886->4888 4889 402bce 17 API calls 4887->4889 4888->4887 4890 4023d1 WritePrivateProfileStringA 4889->4890 4891 40209d 4892 40215d 4891->4892 4893 4020af 4891->4893 4895 401423 24 API calls 4892->4895 4894 402bce 17 API calls 4893->4894 4896 4020b6 4894->4896 4901 4022e2 4895->4901 4897 402bce 17 API calls 4896->4897 4898 4020bf 4897->4898 4899 4020d4 LoadLibraryExA 4898->4899 4900 4020c7 GetModuleHandleA 4898->4900 4899->4892 4902 4020e4 GetProcAddress 4899->4902 4900->4899 4900->4902 4903 402130 4902->4903 4904 4020f3 4902->4904 4907 40521e 24 API calls 4903->4907 4905 402112 4904->4905 4906 4020fb 4904->4906 4912 701a16db 4905->4912 4954 401423 4906->4954 4909 402103 4907->4909 4909->4901 4910 402151 FreeLibrary 4909->4910 4910->4901 4913 701a170b 4912->4913 4957 701a1a98 4913->4957 4915 701a1712 4916 701a1834 4915->4916 4917 701a172a 4915->4917 4918 701a1723 4915->4918 4916->4909 4989 701a22f1 4917->4989 5006 701a22af 4918->5006 4923 701a178e 4927 701a17dc 4923->4927 4928 701a1794 4923->4928 4924 701a1770 5019 701a24d8 4924->5019 4925 701a1759 4937 701a174f 4925->4937 5016 701a2cc3 4925->5016 4926 701a1740 4930 701a1746 4926->4930 4935 701a1751 4926->4935 4933 701a24d8 11 API calls 4927->4933 5038 701a156b 4928->5038 4930->4937 5000 701a2a38 4930->5000 4940 701a17cd 4933->4940 4934 701a1776 5030 701a1559 4934->5030 5010 701a26b2 4935->5010 4937->4923 4937->4924 4953 701a1823 4940->4953 5044 701a249e 4940->5044 4942 701a1757 4942->4937 4943 701a24d8 11 API calls 4943->4940 4947 701a182d GlobalFree 4947->4916 4949 701a180f 4949->4953 5048 701a14e2 wsprintfA 4949->5048 4951 701a1808 FreeLibrary 4951->4949 4953->4916 4953->4947 4955 40521e 24 API calls 4954->4955 4956 401431 4955->4956 4956->4909 5051 701a1215 GlobalAlloc 4957->5051 4959 701a1abf 5052 701a1215 GlobalAlloc 4959->5052 4961 701a1d00 GlobalFree GlobalFree GlobalFree 4962 701a1d1d 4961->4962 4981 701a1d67 4961->4981 4964 701a20f1 4962->4964 4972 701a1d32 4962->4972 4962->4981 4963 701a1bbd GlobalAlloc 4978 701a1aca 4963->4978 4965 701a2113 GetModuleHandleA 4964->4965 4964->4981 4968 701a2139 4965->4968 4969 701a2124 LoadLibraryA 4965->4969 4966 701a1c08 lstrcpyA 4971 701a1c12 lstrcpyA 4966->4971 4967 701a1c26 GlobalFree 4967->4978 5059 701a15c2 GetProcAddress 4968->5059 4969->4968 4969->4981 4971->4978 4972->4981 5055 701a1224 4972->5055 4973 701a218a 4977 701a2197 lstrlenA 4973->4977 4973->4981 4974 701a1fb7 5058 701a1215 GlobalAlloc 4974->5058 5060 701a15c2 GetProcAddress 4977->5060 4978->4961 4978->4963 4978->4966 4978->4967 4978->4971 4978->4974 4979 701a1ef9 GlobalFree 4978->4979 4980 701a2033 4978->4980 4978->4981 4984 701a1224 2 API calls 4978->4984 5053 701a1534 GlobalSize GlobalAlloc 4978->5053 4979->4978 4980->4981 4986 701a208c lstrcpyA 4980->4986 4981->4915 4982 701a214b 4982->4973 4987 701a2174 GetProcAddress 4982->4987 4984->4978 4986->4981 4987->4973 4988 701a1fbf 4988->4915 4997 701a230a 4989->4997 4990 701a1224 GlobalAlloc lstrcpynA 4990->4997 4992 701a2446 GlobalFree 4994 701a1730 4992->4994 4992->4997 4993 701a23b8 GlobalAlloc MultiByteToWideChar 4995 701a23e4 GlobalAlloc 4993->4995 4996 701a2405 4993->4996 4994->4925 4994->4926 4994->4937 4998 701a23fc GlobalFree 4995->4998 4996->4992 5066 701a2646 4996->5066 4997->4990 4997->4992 4997->4993 4997->4996 5062 701a12ad 4997->5062 4998->4992 5003 701a2a4a 5000->5003 5001 701a2aef VirtualAllocEx 5002 701a2b0d 5001->5002 5069 701a29e4 5002->5069 5003->5001 5005 701a2bd9 5005->4937 5007 701a22c4 5006->5007 5008 701a22cf GlobalAlloc 5007->5008 5009 701a1729 5007->5009 5008->5007 5009->4917 5014 701a26e2 5010->5014 5011 701a277d GlobalAlloc 5015 701a27a0 5011->5015 5012 701a2790 5013 701a2796 GlobalSize 5012->5013 5012->5015 5013->5015 5014->5011 5014->5012 5015->4942 5017 701a2cce 5016->5017 5018 701a2d0e GlobalFree 5017->5018 5073 701a1215 GlobalAlloc 5019->5073 5021 701a2598 WideCharToMultiByte 5028 701a24e4 5021->5028 5022 701a2563 lstrcpynA 5022->5028 5023 701a2574 StringFromGUID2 WideCharToMultiByte 5023->5028 5024 701a25b9 wsprintfA 5024->5028 5025 701a25dd GlobalFree 5025->5028 5026 701a2617 GlobalFree 5026->4934 5027 701a1266 2 API calls 5027->5028 5028->5021 5028->5022 5028->5023 5028->5024 5028->5025 5028->5026 5028->5027 5074 701a12d1 5028->5074 5078 701a1215 GlobalAlloc 5030->5078 5032 701a155e 5033 701a156b 2 API calls 5032->5033 5034 701a1568 5033->5034 5035 701a1266 5034->5035 5036 701a12a8 GlobalFree 5035->5036 5037 701a126f GlobalAlloc lstrcpynA 5035->5037 5036->4940 5037->5036 5039 701a1577 wsprintfA 5038->5039 5040 701a15a4 lstrcpyA 5038->5040 5043 701a15bd 5039->5043 5040->5043 5043->4943 5045 701a24ac 5044->5045 5046 701a17ef 5044->5046 5045->5046 5047 701a24c5 GlobalFree 5045->5047 5046->4949 5046->4951 5047->5045 5049 701a1266 2 API calls 5048->5049 5050 701a1503 5049->5050 5050->4953 5051->4959 5052->4978 5054 701a1552 5053->5054 5054->4978 5061 701a1215 GlobalAlloc 5055->5061 5057 701a1233 lstrcpynA 5057->4981 5058->4988 5059->4982 5060->4981 5061->5057 5063 701a12b4 5062->5063 5064 701a1224 2 API calls 5063->5064 5065 701a12cf 5064->5065 5065->4997 5067 701a26aa 5066->5067 5068 701a2654 VirtualAlloc 5066->5068 5067->4996 5068->5067 5070 701a29ef 5069->5070 5071 701a29f4 GetLastError 5070->5071 5072 701a29ff 5070->5072 5071->5072 5072->5005 5073->5028 5075 701a12da 5074->5075 5076 701a12f9 5074->5076 5075->5076 5077 701a12e0 lstrcpyA 5075->5077 5076->5028 5077->5076 5078->5032 5079 40159d 5080 402bce 17 API calls 5079->5080 5081 4015a4 SetFileAttributesA 5080->5081 5082 4015b6 5081->5082 5610 40149d 5611 402387 5610->5611 5612 4014ab PostQuitMessage 5610->5612 5612->5611 5083 401a1e 5084 402bce 17 API calls 5083->5084 5085 401a27 ExpandEnvironmentStringsA 5084->5085 5086 401a3b 5085->5086 5088 401a4e 5085->5088 5087 401a40 lstrcmpA 5086->5087 5086->5088 5087->5088 5089 40171f 5090 402bce 17 API calls 5089->5090 5091 401726 SearchPathA 5090->5091 5092 401741 5091->5092 5852 401d1f 5853 402bac 17 API calls 5852->5853 5854 401d26 5853->5854 5855 402bac 17 API calls 5854->5855 5856 401d32 GetDlgItem 5855->5856 5857 402620 5856->5857 5100 402421 5101 402453 5100->5101 5102 402428 5100->5102 5104 402bce 17 API calls 5101->5104 5103 402c0e 17 API calls 5102->5103 5105 40242f 5103->5105 5106 40245a 5104->5106 5107 402439 5105->5107 5110 402467 5105->5110 5112 402c8c 5106->5112 5109 402bce 17 API calls 5107->5109 5111 402440 RegDeleteValueA RegCloseKey 5109->5111 5111->5110 5113 402c98 5112->5113 5114 402c9f 5112->5114 5113->5110 5114->5113 5116 402cd0 5114->5116 5117 405f7d RegOpenKeyExA 5116->5117 5118 402cfe 5117->5118 5119 402db3 5118->5119 5120 402d08 5118->5120 5119->5113 5121 402d0e RegEnumValueA 5120->5121 5125 402d31 5120->5125 5122 402d98 RegCloseKey 5121->5122 5121->5125 5122->5119 5123 402d6d RegEnumKeyA 5124 402d76 RegCloseKey 5123->5124 5123->5125 5126 406500 5 API calls 5124->5126 5125->5122 5125->5123 5125->5124 5127 402cd0 6 API calls 5125->5127 5128 402d86 5126->5128 5127->5125 5129 402da8 5128->5129 5130 402d8a RegDeleteKeyA 5128->5130 5129->5119 5130->5119 5131 4027a1 5132 402bce 17 API calls 5131->5132 5133 4027a8 FindFirstFileA 5132->5133 5134 4027cb 5133->5134 5138 4027bb 5133->5138 5135 4027d2 5134->5135 5139 406055 wsprintfA 5134->5139 5140 4060f7 lstrcpynA 5135->5140 5139->5135 5140->5138 5493 402626 5494 40262b 5493->5494 5495 40263f 5493->5495 5496 402bac 17 API calls 5494->5496 5497 402bce 17 API calls 5495->5497 5499 402634 5496->5499 5498 402646 lstrlenA 5497->5498 5498->5499 5500 402668 5499->5500 5501 405d37 WriteFile 5499->5501 5501->5500 5618 403ca7 5619 403dfa 5618->5619 5620 403cbf 5618->5620 5621 403e0b GetDlgItem GetDlgItem 5619->5621 5627 403e4b 5619->5627 5620->5619 5622 403ccb 5620->5622 5625 40417b 18 API calls 5621->5625 5623 403cd6 SetWindowPos 5622->5623 5624 403ce9 5622->5624 5623->5624 5628 403d06 5624->5628 5629 403cee ShowWindow 5624->5629 5630 403e35 SetClassLongA 5625->5630 5626 403ea5 5631 4041c7 SendMessageA 5626->5631 5636 403df5 5626->5636 5627->5626 5635 401389 2 API calls 5627->5635 5632 403d28 5628->5632 5633 403d0e DestroyWindow 5628->5633 5629->5628 5634 40140b 2 API calls 5630->5634 5658 403eb7 5631->5658 5638 403d2d SetWindowLongA 5632->5638 5639 403d3e 5632->5639 5637 404104 5633->5637 5634->5627 5640 403e7d 5635->5640 5637->5636 5646 404135 ShowWindow 5637->5646 5638->5636 5643 403db5 5639->5643 5644 403d4a GetDlgItem 5639->5644 5640->5626 5645 403e81 SendMessageA 5640->5645 5641 40140b 2 API calls 5641->5658 5642 404106 DestroyWindow EndDialog 5642->5637 5649 4041e2 8 API calls 5643->5649 5647 403d7a 5644->5647 5648 403d5d SendMessageA IsWindowEnabled 5644->5648 5645->5636 5646->5636 5651 403d87 5647->5651 5652 403d9a 5647->5652 5653 403dce SendMessageA 5647->5653 5661 403d7f 5647->5661 5648->5636 5648->5647 5649->5636 5650 40618a 17 API calls 5650->5658 5651->5653 5651->5661 5656 403da2 5652->5656 5657 403db7 5652->5657 5653->5643 5655 40417b 18 API calls 5655->5658 5659 40140b 2 API calls 5656->5659 5660 40140b 2 API calls 5657->5660 5658->5636 5658->5641 5658->5642 5658->5650 5658->5655 5662 40417b 18 API calls 5658->5662 5678 404046 DestroyWindow 5658->5678 5659->5661 5660->5661 5661->5643 5687 404154 5661->5687 5663 403f32 GetDlgItem 5662->5663 5664 403f47 5663->5664 5665 403f4f ShowWindow EnableWindow 5663->5665 5664->5665 5690 40419d EnableWindow 5665->5690 5667 403f79 EnableWindow 5672 403f8d 5667->5672 5668 403f92 GetSystemMenu EnableMenuItem SendMessageA 5669 403fc2 SendMessageA 5668->5669 5668->5672 5669->5672 5671 403c88 18 API calls 5671->5672 5672->5668 5672->5671 5691 4041b0 SendMessageA 5672->5691 5692 4060f7 lstrcpynA 5672->5692 5674 403ff1 lstrlenA 5675 40618a 17 API calls 5674->5675 5676 404002 SetWindowTextA 5675->5676 5677 401389 2 API calls 5676->5677 5677->5658 5678->5637 5679 404060 CreateDialogParamA 5678->5679 5679->5637 5680 404093 5679->5680 5681 40417b 18 API calls 5680->5681 5682 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5681->5682 5683 401389 2 API calls 5682->5683 5684 4040e4 5683->5684 5684->5636 5685 4040ec ShowWindow 5684->5685 5686 4041c7 SendMessageA 5685->5686 5686->5637 5688 404161 SendMessageA 5687->5688 5689 40415b 5687->5689 5688->5643 5689->5688 5690->5667 5691->5672 5692->5674 5173 40272b 5174 402732 5173->5174 5175 4029aa 5173->5175 5176 402bac 17 API calls 5174->5176 5177 402739 5176->5177 5178 402748 SetFilePointer 5177->5178 5178->5175 5179 402758 5178->5179 5181 406055 wsprintfA 5179->5181 5181->5175 5192 401c2e 5193 402bac 17 API calls 5192->5193 5194 401c35 5193->5194 5195 402bac 17 API calls 5194->5195 5196 401c42 5195->5196 5197 401c57 5196->5197 5198 402bce 17 API calls 5196->5198 5199 402bce 17 API calls 5197->5199 5203 401c67 5197->5203 5198->5197 5199->5203 5200 401c72 5204 402bac 17 API calls 5200->5204 5201 401cbe 5202 402bce 17 API calls 5201->5202 5205 401cc3 5202->5205 5203->5200 5203->5201 5206 401c77 5204->5206 5207 402bce 17 API calls 5205->5207 5208 402bac 17 API calls 5206->5208 5209 401ccc FindWindowExA 5207->5209 5210 401c83 5208->5210 5213 401cea 5209->5213 5211 401c90 SendMessageTimeoutA 5210->5211 5212 401cae SendMessageA 5210->5212 5211->5213 5212->5213 5693 4042b1 lstrcpynA lstrlenA 5220 5e41d17 5221 5e41d31 5220->5221 5223 5e41d43 5220->5223 5221->5223 5224 5e419ff 5221->5224 5225 5e41481 5224->5225 5227 5e41a3c 5225->5227 5228 5e41486 5225->5228 5227->5223 5229 5e414aa 5228->5229 5229->5229 5230 5e414b9 NtAllocateVirtualMemory 5229->5230 5231 5e414ca 5230->5231 5231->5231 5232 401e35 GetDC 5233 402bac 17 API calls 5232->5233 5234 401e47 GetDeviceCaps MulDiv ReleaseDC 5233->5234 5235 402bac 17 API calls 5234->5235 5236 401e78 5235->5236 5237 40618a 17 API calls 5236->5237 5238 401eb5 CreateFontIndirectA 5237->5238 5239 402620 5238->5239 5502 402a35 SendMessageA 5503 402a5a 5502->5503 5504 402a4f InvalidateRect 5502->5504 5504->5503 5694 4014b7 5695 4014bd 5694->5695 5696 401389 2 API calls 5695->5696 5697 4014c5 5696->5697 6059 701a2be3 6060 701a2bfb 6059->6060 6061 701a1534 2 API calls 6060->6061 6062 701a2c16 6061->6062 5698 701a10e0 5707 701a110e 5698->5707 5699 701a11c4 GlobalFree 5700 701a12ad 2 API calls 5700->5707 5701 701a11c3 5701->5699 5702 701a11ea GlobalFree 5702->5707 5703 701a1266 2 API calls 5706 701a11b1 GlobalFree 5703->5706 5704 701a1155 GlobalAlloc 5704->5707 5705 701a12d1 lstrcpyA 5705->5707 5706->5707 5707->5699 5707->5700 5707->5701 5707->5702 5707->5703 5707->5704 5707->5705 5707->5706 6063 402dba 6064 402de2 6063->6064 6065 402dc9 SetTimer 6063->6065 6066 402e37 6064->6066 6067 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 6064->6067 6065->6064 6067->6066 5289 4015bb 5290 402bce 17 API calls 5289->5290 5291 4015c2 5290->5291 5292 405b28 4 API calls 5291->5292 5304 4015ca 5292->5304 5293 401624 5295 401652 5293->5295 5296 401629 5293->5296 5294 405aba CharNextA 5294->5304 5298 401423 24 API calls 5295->5298 5297 401423 24 API calls 5296->5297 5299 401630 5297->5299 5305 40164a 5298->5305 5308 4060f7 lstrcpynA 5299->5308 5301 405761 2 API calls 5301->5304 5302 40577e 5 API calls 5302->5304 5303 40163b SetCurrentDirectoryA 5303->5305 5304->5293 5304->5294 5304->5301 5304->5302 5306 40160c GetFileAttributesA 5304->5306 5307 4056e4 4 API calls 5304->5307 5306->5304 5307->5304 5308->5303 5708 4016bb 5709 402bce 17 API calls 5708->5709 5710 4016c1 GetFullPathNameA 5709->5710 5711 4016f9 5710->5711 5712 4016d8 5710->5712 5713 402a5a 5711->5713 5714 40170d GetShortPathNameA 5711->5714 5712->5711 5715 40646b 2 API calls 5712->5715 5714->5713 5716 4016e9 5715->5716 5716->5711 5718 4060f7 lstrcpynA 5716->5718 5718->5711

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 8 403393 1->8 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 8->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 22 4033da 17->22 22->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 31 403470-403478 29->31 32 40346a-40346e 29->32 33 403542-40355c GetTempPathA call 403317 30->33 34 403480-403483 31->34 35 40347a-40347b 31->35 32->31 32->32 43 4035b4-4035ce DeleteFileA call 402ea1 33->43 44 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 33->44 37 403515-403522 call 405aba 34->37 38 403489-40348d 34->38 35->34 37->28 56 403524 37->56 41 4034a5-4034d2 38->41 42 40348f-403495 38->42 45 4034d4-4034da 41->45 46 4034e5-403513 41->46 50 403497-403499 42->50 51 40349b 42->51 59 403662-403672 call 403830 OleUninitialize 43->59 60 4035d4-4035da 43->60 44->43 58 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 44->58 52 4034e0 45->52 53 4034dc-4034de 45->53 46->37 55 403531-40353d call 4060f7 46->55 50->41 50->51 51->41 52->46 53->46 53->52 55->33 56->28 58->43 58->59 72 403796-40379c 59->72 73 403678-403688 call 405813 ExitProcess 59->73 63 403652-403659 call 40390a 60->63 64 4035dc-4035e7 call 405aba 60->64 70 40365e 63->70 76 4035e9-403612 64->76 77 40361d-403627 64->77 70->59 74 403818-403820 72->74 75 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->75 85 403822 74->85 86 403826-40382a ExitProcess 74->86 82 4037e9-4037f7 call 406500 75->82 83 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 75->83 84 403614-403616 76->84 79 403629-403636 call 405b7d 77->79 80 40368e-4036a2 call 40577e lstrcatA 77->80 79->59 94 403638-40364e call 4060f7 * 2 79->94 95 4036a4-4036aa lstrcatA 80->95 96 4036af-4036c9 lstrcatA lstrcmpiA 80->96 97 403805-40380f ExitWindowsEx 82->97 98 4037f9-403803 82->98 83->82 84->77 90 403618-40361b 84->90 85->86 90->77 90->84 94->63 95->96 96->59 100 4036cb-4036ce 96->100 97->74 101 403811-403813 call 40140b 97->101 98->97 98->101 103 4036d0-4036d5 call 4056e4 100->103 104 4036d7 call 405761 100->104 101->74 112 4036dc-4036e9 SetCurrentDirectoryA 103->112 104->112 113 4036f6-40371e call 4060f7 112->113 114 4036eb-4036f1 call 4060f7 112->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 124 40378a-403791 call 405ed6 121->124 122->121 123 403754-403774 call 405ed6 call 40618a call 405796 122->123 123->121 133 403776-40377d CloseHandle 123->133 124->59 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 0040336D
                              • GetVersion.KERNEL32 ref: 00403373
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                              • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033E2
                              • OleInitialize.OLE32(00000000), ref: 004033E9
                              • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 00403405
                              • GetCommandLineA.KERNEL32(Aftopningen Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 0040341A
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\LkzvfB4VFj.exe",00000020,"C:\Users\user\Desktop\LkzvfB4VFj.exe",00000000,?,00000007,00000009,0000000B), ref: 00403456
                              • GetTempPathA.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 00403553
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 00403564
                              • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403570
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403584
                              • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040358C
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040359D
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004035A5
                              • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 004035B9
                                • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,771B3410), ref: 004039FA
                                • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                • Part of subcall function 0040390A: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                • Part of subcall function 00403830: CloseHandle.KERNEL32(000002EC,00403667,?,?,00000007,00000009,0000000B), ref: 0040383B
                              • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403667
                              • ExitProcess.KERNEL32 ref: 00403688
                              • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004037A5
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                              • ExitProcess.KERNEL32 ref: 0040382A
                                • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                              • String ID: "$"C:\Users\user\Desktop\LkzvfB4VFj.exe"$.tmp$1033$Aftopningen Setup$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\LkzvfB4VFj.exe$C:\Users\user\tranchet$C:\Users\user\tranchet\Trykmaalere$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3776617018-2872349218
                              • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                              • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                              • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                              • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 337 4058bf-4058e5 call 405b7d 340 4058e7-4058f9 DeleteFileA 337->340 341 4058fe-405905 337->341 342 405a88-405a8c 340->342 343 405907-405909 341->343 344 405918-405928 call 4060f7 341->344 345 405a36-405a3b 343->345 346 40590f-405912 343->346 352 405937-405938 call 405ad6 344->352 353 40592a-405935 lstrcatA 344->353 345->342 348 405a3d-405a40 345->348 346->344 346->345 350 405a42-405a48 348->350 351 405a4a-405a52 call 40646b 348->351 350->342 351->342 361 405a54-405a68 call 405a8f call 405877 351->361 355 40593d-405940 352->355 353->355 358 405942-405949 355->358 359 40594b-405951 lstrcatA 355->359 358->359 360 405956-405974 lstrlenA FindFirstFileA 358->360 359->360 362 40597a-405991 call 405aba 360->362 363 405a2c-405a30 360->363 376 405a80-405a83 call 40521e 361->376 377 405a6a-405a6d 361->377 370 405993-405997 362->370 371 40599c-40599f 362->371 363->345 365 405a32 363->365 365->345 370->371 373 405999 370->373 374 4059a1-4059a6 371->374 375 4059b2-4059c0 call 4060f7 371->375 373->371 379 4059a8-4059aa 374->379 380 405a0b-405a1d FindNextFileA 374->380 387 4059c2-4059ca 375->387 388 4059d7-4059e2 call 405877 375->388 376->342 377->350 382 405a6f-405a7e call 40521e call 405ed6 377->382 379->375 383 4059ac-4059b0 379->383 380->362 385 405a23-405a26 FindClose 380->385 382->342 383->375 383->380 385->363 387->380 392 4059cc-4059d5 call 4058bf 387->392 397 405a03-405a06 call 40521e 388->397 398 4059e4-4059e7 388->398 392->380 397->380 399 4059e9-4059f9 call 40521e call 405ed6 398->399 400 4059fb-405a01 398->400 399->380 400->380
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004058E8
                              • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405930
                              • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405951
                              • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405957
                              • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405968
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A15
                              • FindClose.KERNEL32(00000000), ref: 00405A26
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004058CC
                              • "C:\Users\user\Desktop\LkzvfB4VFj.exe", xrefs: 004058BF
                              • \*.*, xrefs: 0040592A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\LkzvfB4VFj.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                              • API String ID: 2035342205-4170395442
                              • Opcode ID: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                              • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                              • Opcode Fuzzy Hash: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                              • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                              APIs
                              • CoCreateInstance.OLE32(00408524,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                              Strings
                              • C:\Users\user\tranchet\Trykmaalere, xrefs: 00402230
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\tranchet\Trykmaalere
                              • API String ID: 123533781-2000945231
                              • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                              • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                              • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                              • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                              APIs
                              • FindFirstFileA.KERNELBASE(771B3410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00406476
                              • FindClose.KERNELBASE(00000000), ref: 00406482
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                              • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                              • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                              • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                              APIs
                              • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 004027B0
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                              • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                              • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                              • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A
                              APIs
                              • NtAllocateVirtualMemory.NTDLL(?), ref: 05E414B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.3734765818.0000000005D64000.00000040.00001000.00020000.00000000.sdmp, Offset: 05D64000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5d64000_LkzvfB4VFj.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateMemoryVirtual
                              • String ID:
                              • API String ID: 2167126740-0
                              • Opcode ID: 62fac4ccc3655a85e2da4b5f6bff7cc1a3cb4ac7a71ee549f9a5837631174800
                              • Instruction ID: 92159576a94368cf6f0344e63dd0c981926b60c3a9e8ec85162afadbe879136d
                              • Opcode Fuzzy Hash: 62fac4ccc3655a85e2da4b5f6bff7cc1a3cb4ac7a71ee549f9a5837631174800
                              • Instruction Fuzzy Hash: 2DF098716006498FDF29DE78D9886DD77A2FFC8319F218529D949CB718D634A9458A00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 40390a-403922 call 406500 137 403924-403934 call 406055 134->137 138 403936-403967 call 405fde 134->138 147 40398a-4039b3 call 403bcf call 405b7d 137->147 143 403969-40397a call 405fde 138->143 144 40397f-403985 lstrcatA 138->144 143->144 144->147 152 4039b9-4039be 147->152 153 403a3a-403a42 call 405b7d 147->153 152->153 154 4039c0-4039e4 call 405fde 152->154 159 403a50-403a75 LoadImageA 153->159 160 403a44-403a4b call 40618a 153->160 154->153 161 4039e6-4039e8 154->161 163 403af6-403afe call 40140b 159->163 164 403a77-403aa7 RegisterClassA 159->164 160->159 165 4039f9-403a05 lstrlenA 161->165 166 4039ea-4039f7 call 405aba 161->166 177 403b00-403b03 163->177 178 403b08-403b13 call 403bcf 163->178 167 403bc5 164->167 168 403aad-403af1 SystemParametersInfoA CreateWindowExA 164->168 172 403a07-403a15 lstrcmpiA 165->172 173 403a2d-403a35 call 405a8f call 4060f7 165->173 166->165 171 403bc7-403bce 167->171 168->163 172->173 176 403a17-403a21 GetFileAttributesA 172->176 173->153 180 403a23-403a25 176->180 181 403a27-403a28 call 405ad6 176->181 177->171 187 403b19-403b33 ShowWindow call 406492 178->187 188 403b9c-403ba4 call 4052f0 178->188 180->173 180->181 181->173 193 403b35-403b3a call 406492 187->193 194 403b3f-403b51 GetClassInfoA 187->194 195 403ba6-403bac 188->195 196 403bbe-403bc0 call 40140b 188->196 193->194 200 403b53-403b63 GetClassInfoA RegisterClassA 194->200 201 403b69-403b9a DialogBoxParamA call 40140b call 40385a 194->201 195->177 197 403bb2-403bb9 call 40140b 195->197 196->167 197->177 200->201 201->171
                              APIs
                                • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                              • lstrcatA.KERNEL32(1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\LkzvfB4VFj.exe",00000000), ref: 00403985
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,771B3410), ref: 004039FA
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                              • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                              • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AB6
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B21
                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                              • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                              • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                              • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\LkzvfB4VFj.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\tranchet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-727111979
                              • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                              • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                              • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                              • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 208 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 211 402ef1-402ef6 208->211 212 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 208->212 213 4030d1-4030d5 211->213 220 403014-403022 call 402e3d 212->220 221 402f2f 212->221 228 403024-403027 220->228 229 403077-40307c 220->229 223 402f34-402f4b 221->223 225 402f4d 223->225 226 402f4f-402f58 call 4032ea 223->226 225->226 233 40307e-403086 call 402e3d 226->233 234 402f5e-402f65 226->234 231 403029-403041 call 403300 call 4032ea 228->231 232 40304b-403075 GlobalAlloc call 403300 call 4030d8 228->232 229->213 231->229 254 403043-403049 231->254 232->229 259 403088-403099 232->259 233->229 238 402fe1-402fe5 234->238 239 402f67-402f7b call 405c4b 234->239 243 402fe7-402fee call 402e3d 238->243 244 402fef-402ff5 238->244 239->244 257 402f7d-402f84 239->257 243->244 250 403004-40300c 244->250 251 402ff7-403001 call 4065b7 244->251 250->223 258 403012 250->258 251->250 254->229 254->232 257->244 261 402f86-402f8d 257->261 258->220 262 4030a1-4030a6 259->262 263 40309b 259->263 261->244 265 402f8f-402f96 261->265 264 4030a7-4030ad 262->264 263->262 264->264 266 4030af-4030ca SetFilePointer call 405c4b 264->266 265->244 267 402f98-402f9f 265->267 270 4030cf 266->270 267->244 269 402fa1-402fc1 267->269 269->229 271 402fc7-402fcb 269->271 270->213 272 402fd3-402fdb 271->272 273 402fcd-402fd1 271->273 272->244 274 402fdd-402fdf 272->274 273->258 273->272 274->244
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402EB2
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\LkzvfB4VFj.exe,00000400), ref: 00402ECE
                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\LkzvfB4VFj.exe,80000000,00000003), ref: 00405C94
                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                              • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\LkzvfB4VFj.exe,C:\Users\user\Desktop\LkzvfB4VFj.exe,80000000,00000003), ref: 00402F1A
                              • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\LkzvfB4VFj.exe"$@TA$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\LkzvfB4VFj.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-628670056
                              • Opcode ID: c0245206ecb50fddb531a2e3f507f0061b5a3b33be204127287087ce9ef71ecc
                              • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                              • Opcode Fuzzy Hash: c0245206ecb50fddb531a2e3f507f0061b5a3b33be204127287087ce9ef71ecc
                              • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 275 40618a-406195 276 406197-4061a6 275->276 277 4061a8-4061be 275->277 276->277 278 4061c4-4061cf 277->278 279 4063af-4063b3 277->279 278->279 280 4061d5-4061dc 278->280 281 4061e1-4061eb 279->281 282 4063b9-4063c3 279->282 280->279 281->282 283 4061f1-4061f8 281->283 284 4063c5-4063c9 call 4060f7 282->284 285 4063ce-4063cf 282->285 286 4063a2 283->286 287 4061fe-406232 283->287 284->285 289 4063a4-4063aa 286->289 290 4063ac-4063ae 286->290 291 406238-406242 287->291 292 40634f-406352 287->292 289->279 290->279 293 406244-406248 291->293 294 40625c 291->294 295 406382-406385 292->295 296 406354-406357 292->296 293->294 299 40624a-40624e 293->299 302 406263-40626a 294->302 297 406393-4063a0 lstrlenA 295->297 298 406387-40638e call 40618a 295->298 300 406367-406373 call 4060f7 296->300 301 406359-406365 call 406055 296->301 297->279 298->297 299->294 304 406250-406254 299->304 313 406378-40637e 300->313 301->313 306 40626c-40626e 302->306 307 40626f-406271 302->307 304->294 309 406256-40625a 304->309 306->307 311 406273-40628e call 405fde 307->311 312 4062aa-4062ad 307->312 309->302 321 406293-406296 311->321 314 4062bd-4062c0 312->314 315 4062af-4062bb GetSystemDirectoryA 312->315 313->297 317 406380 313->317 319 4062c2-4062d0 GetWindowsDirectoryA 314->319 320 40632d-40632f 314->320 318 406331-406334 315->318 322 406347-40634d call 4063d2 317->322 318->322 324 406336-40633a 318->324 319->320 320->318 323 4062d2-4062dc 320->323 321->324 325 40629c-4062a5 call 40618a 321->325 322->297 330 4062f6-40630c SHGetSpecialFolderLocation 323->330 331 4062de-4062e1 323->331 324->322 328 40633c-406342 lstrcatA 324->328 325->318 328->322 334 40632a 330->334 335 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 330->335 331->330 333 4062e3-4062ea 331->333 336 4062f2-4062f4 333->336 334->320 335->318 335->334 336->318 336->330
                              APIs
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0042A070,00000000,00405256,0042A070,00000000), ref: 004062C8
                              • SHGetSpecialFolderLocation.SHELL32(00405256,771B23A0,?,0042A070,00000000,00405256,0042A070,00000000), ref: 00406304
                              • SHGetPathFromIDListA.SHELL32(771B23A0,Call), ref: 00406312
                              • CoTaskMemFree.OLE32(771B23A0), ref: 0040631E
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                              • lstrlenA.KERNEL32(Call,?,0042A070,00000000,00405256,0042A070,00000000,00000000,00424248,771B23A0), ref: 00406394
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$z4x
                              • API String ID: 717251189-325629041
                              • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                              • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                              • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                              • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 406 401759-40177c call 402bce call 405afc 411 401786-401798 call 4060f7 call 405a8f lstrcatA 406->411 412 40177e-401784 call 4060f7 406->412 417 40179d-4017a3 call 4063d2 411->417 412->417 422 4017a8-4017ac 417->422 423 4017ae-4017b8 call 40646b 422->423 424 4017df-4017e2 422->424 432 4017ca-4017dc 423->432 433 4017ba-4017c8 CompareFileTime 423->433 425 4017e4-4017e5 call 405c6b 424->425 426 4017ea-401806 call 405c90 424->426 425->426 434 401808-40180b 426->434 435 40187e-4018a7 call 40521e call 4030d8 426->435 432->424 433->432 436 401860-40186a call 40521e 434->436 437 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 434->437 449 4018a9-4018ad 435->449 450 4018af-4018bb SetFileTime 435->450 447 401873-401879 436->447 437->422 469 401855-401856 437->469 452 402a63 447->452 449->450 451 4018c1-4018cc CloseHandle 449->451 450->451 455 4018d2-4018d5 451->455 456 402a5a-402a5d 451->456 454 402a65-402a69 452->454 458 4018d7-4018e8 call 40618a lstrcatA 455->458 459 4018ea-4018ed call 40618a 455->459 456->452 465 4018f2-402382 458->465 459->465 470 402387-40238c 465->470 471 402382 call 405813 465->471 469->447 472 401858-401859 469->472 470->454 471->470 472->436
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,Aftopningen Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp$C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp\System.dll$C:\Users\user\tranchet\Trykmaalere$Call
                              • API String ID: 1941528284-3941408138
                              • Opcode ID: ecb5e0b52cbeaa5e3ffb0e457e94c2fbda9728b5135f0475c8711011a6283698
                              • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                              • Opcode Fuzzy Hash: ecb5e0b52cbeaa5e3ffb0e457e94c2fbda9728b5135f0475c8711011a6283698
                              • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 473 4030d8-4030ec 474 4030f5-4030fe 473->474 475 4030ee 473->475 476 403100 474->476 477 403107-40310c 474->477 475->474 476->477 478 40311c-403129 call 4032ea 477->478 479 40310e-403117 call 403300 477->479 483 4032d8 478->483 484 40312f-403133 478->484 479->478 485 4032da-4032db 483->485 486 403283-403285 484->486 487 403139-403182 GetTickCount 484->487 490 4032e3-4032e7 485->490 488 4032c5-4032c8 486->488 489 403287-40328a 486->489 491 4032e0 487->491 492 403188-403190 487->492 496 4032ca 488->496 497 4032cd-4032d6 call 4032ea 488->497 489->491 493 40328c 489->493 491->490 494 403192 492->494 495 403195-4031a3 call 4032ea 492->495 498 40328f-403295 493->498 494->495 495->483 507 4031a9-4031b2 495->507 496->497 497->483 505 4032dd 497->505 502 403297 498->502 503 403299-4032a7 call 4032ea 498->503 502->503 503->483 510 4032a9-4032b5 call 405d37 503->510 505->491 509 4031b8-4031d8 call 406625 507->509 515 40327b-40327d 509->515 516 4031de-4031f1 GetTickCount 509->516 517 4032b7-4032c1 510->517 518 40327f-403281 510->518 515->485 519 4031f3-4031fb 516->519 520 403236-403238 516->520 517->498 523 4032c3 517->523 518->485 524 403203-403233 MulDiv wsprintfA call 40521e 519->524 525 4031fd-403201 519->525 521 40323a-40323e 520->521 522 40326f-403273 520->522 527 403240-403247 call 405d37 521->527 528 403255-403260 521->528 522->492 529 403279 522->529 523->491 524->520 525->520 525->524 533 40324c-40324e 527->533 532 403263-403267 528->532 529->491 532->509 534 40326d 532->534 533->518 535 403250-403253 533->535 534->491 535->532
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CountTick$wsprintf
                              • String ID: ... %d%%$HBB
                              • API String ID: 551687249-372310663
                              • Opcode ID: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                              • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                              • Opcode Fuzzy Hash: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                              • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                              Control-flow Graph

                              APIs
                              • GetDC.USER32(?), ref: 00401E38
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                              • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                              • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID: Calibri
                              • API String ID: 3808545654-1409258342
                              • Opcode ID: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                              • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                              • Opcode Fuzzy Hash: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                              • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 545 4056e4-40572f CreateDirectoryA 546 405731-405733 545->546 547 405735-405742 GetLastError 545->547 548 40575c-40575e 546->548 547->548 549 405744-405758 SetFileSecurityA 547->549 549->546 550 40575a GetLastError 549->550 550->548
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405727
                              • GetLastError.KERNEL32 ref: 0040573B
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                              • GetLastError.KERNEL32 ref: 0040575A
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040570A
                              • C:\Users\user\Desktop, xrefs: 004056E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop
                              • API String ID: 3449924974-2752704311
                              • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                              • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                              • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                              • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 551 406492-4064b2 GetSystemDirectoryA 552 4064b4 551->552 553 4064b6-4064b8 551->553 552->553 554 4064c8-4064ca 553->554 555 4064ba-4064c2 553->555 557 4064cb-4064fd wsprintfA LoadLibraryExA 554->557 555->554 556 4064c4-4064c6 555->556 556->557
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                              • wsprintfA.USER32 ref: 004064E2
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                              • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                              • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                              • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 558 405cbf-405cc9 559 405cca-405cf5 GetTickCount GetTempFileNameA 558->559 560 405d04-405d06 559->560 561 405cf7-405cf9 559->561 562 405cfe-405d01 560->562 561->559 563 405cfb 561->563 563->562
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405CD3
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CED
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405CC2
                              • "C:\Users\user\Desktop\LkzvfB4VFj.exe", xrefs: 00405CBF
                              • nsa, xrefs: 00405CCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\LkzvfB4VFj.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-1411293235
                              • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                              • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                              • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                              • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 564 402cd0-402cf9 call 405f7d 566 402cfe-402d02 564->566 567 402db3-402db7 566->567 568 402d08-402d0c 566->568 569 402d31-402d44 568->569 570 402d0e-402d2f RegEnumValueA 568->570 572 402d6d-402d74 RegEnumKeyA 569->572 570->569 571 402d98-402da6 RegCloseKey 570->571 571->567 573 402d46-402d48 572->573 574 402d76-402d88 RegCloseKey call 406500 572->574 573->571 575 402d4a-402d5e call 402cd0 573->575 580 402da8-402dae 574->580 581 402d8a-402d96 RegDeleteKeyA 574->581 575->574 582 402d60-402d6c 575->582 580->567 581->567 582->572
                              APIs
                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CloseEnum$DeleteValue
                              • String ID:
                              • API String ID: 1354259210-0
                              • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                              • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                              • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                              • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 583 701a16db-701a1717 call 701a1a98 587 701a171d-701a1721 583->587 588 701a1834-701a1836 583->588 589 701a172a-701a1737 call 701a22f1 587->589 590 701a1723-701a1729 call 701a22af 587->590 595 701a1739-701a173e 589->595 596 701a1767-701a176e 589->596 590->589 599 701a1759-701a175c 595->599 600 701a1740-701a1741 595->600 597 701a178e-701a1792 596->597 598 701a1770-701a178c call 701a24d8 call 701a1559 call 701a1266 GlobalFree 596->598 601 701a17dc-701a17e2 call 701a24d8 597->601 602 701a1794-701a17da call 701a156b call 701a24d8 597->602 623 701a17e3-701a17e7 598->623 599->596 603 701a175e-701a175f call 701a2cc3 599->603 605 701a1749-701a174a call 701a2a38 600->605 606 701a1743-701a1744 600->606 601->623 602->623 617 701a1764 603->617 614 701a174f 605->614 611 701a1751-701a1757 call 701a26b2 606->611 612 701a1746-701a1747 606->612 622 701a1766 611->622 612->596 612->605 614->617 617->622 622->596 626 701a17e9-701a17f7 call 701a249e 623->626 627 701a1824-701a182b 623->627 633 701a17f9-701a17fc 626->633 634 701a180f-701a1816 626->634 627->588 630 701a182d-701a182e GlobalFree 627->630 630->588 633->634 636 701a17fe-701a1806 633->636 634->627 635 701a1818-701a1823 call 701a14e2 634->635 635->627 636->634 637 701a1808-701a1809 FreeLibrary 636->637 637->634
                              APIs
                                • Part of subcall function 701A1A98: GlobalFree.KERNEL32(?), ref: 701A1D09
                                • Part of subcall function 701A1A98: GlobalFree.KERNEL32(?), ref: 701A1D0E
                                • Part of subcall function 701A1A98: GlobalFree.KERNEL32(?), ref: 701A1D13
                              • GlobalFree.KERNEL32(00000000), ref: 701A1786
                              • FreeLibrary.KERNEL32(?), ref: 701A1809
                              • GlobalFree.KERNEL32(00000000), ref: 701A182E
                                • Part of subcall function 701A22AF: GlobalAlloc.KERNEL32(00000040,?), ref: 701A22E0
                                • Part of subcall function 701A26B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,701A1757,00000000), ref: 701A2782
                                • Part of subcall function 701A156B: wsprintfA.USER32 ref: 701A1599
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarywsprintf
                              • String ID:
                              • API String ID: 3962662361-3916222277
                              • Opcode ID: a1068af5426ed061574c3357d4d22e9c4b00648d498d5ef7ed9633018b24db43
                              • Instruction ID: dec6b5aad2fc37e65ad2aef9d44499455f1c795cad9223c85fc55abd052016c1
                              • Opcode Fuzzy Hash: a1068af5426ed061574c3357d4d22e9c4b00648d498d5ef7ed9633018b24db43
                              • Instruction Fuzzy Hash: 0F41D4FA0002049BCB019FB8CD85B9E37ACBF15220F169479F907AAA96DF749445C7A0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 640 401c2e-401c4e call 402bac * 2 645 401c50-401c57 call 402bce 640->645 646 401c5a-401c5e 640->646 645->646 648 401c60-401c67 call 402bce 646->648 649 401c6a-401c70 646->649 648->649 652 401c72-401c8e call 402bac * 2 649->652 653 401cbe-401ce4 call 402bce * 2 FindWindowExA 649->653 664 401c90-401cac SendMessageTimeoutA 652->664 665 401cae-401cbc SendMessageA 652->665 663 401cea 653->663 666 401ced-401cf0 663->666 664->666 665->663 667 401cf6 666->667 668 402a5a-402a69 666->668 667->668
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                              • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                              • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                              • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 671 402476-4024a7 call 402bce * 2 call 402c5e 678 402a5a-402a69 671->678 679 4024ad-4024b7 671->679 680 4024c7-4024ca 679->680 681 4024b9-4024c6 call 402bce lstrlenA 679->681 685 4024e1-4024e4 680->685 686 4024cc-4024e0 call 402bac 680->686 681->680 689 4024f5-402509 RegSetValueExA 685->689 690 4024e6-4024f0 call 4030d8 685->690 686->685 693 40250b 689->693 694 40250e-4025eb RegCloseKey 689->694 690->689 693->694 694->678
                              APIs
                              • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp,00000023,00000011,00000002), ref: 004024C1
                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp,00000000,00000011,00000002), ref: 00402501
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp,00000000,00000011,00000002), ref: 004025E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CloseValuelstrlen
                              • String ID: C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp
                              • API String ID: 2655323295-4078682171
                              • Opcode ID: ba33fc4c4d0ecc9b030ab3607fc449a4f558c2d33ecb01bdbe77695abd341d8b
                              • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                              • Opcode Fuzzy Hash: ba33fc4c4d0ecc9b030ab3607fc449a4f558c2d33ecb01bdbe77695abd341d8b
                              • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                              • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                              • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                              • Opcode Fuzzy Hash: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                              • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E
                              APIs
                                • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B36
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405727
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,000000F0), ref: 0040163C
                              Strings
                              • C:\Users\user\tranchet\Trykmaalere, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\tranchet\Trykmaalere
                              • API String ID: 1892508949-2000945231
                              • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                              • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                              • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                              • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                              APIs
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,0042A070,?,?,?,00000002,Call,?,00406293,80000002), ref: 00406024
                              • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0042A070), ref: 0040602F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID: Call
                              • API String ID: 3356406503-1824292864
                              • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                              • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                              • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                              • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                              APIs
                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                              • CloseHandle.KERNEL32(?), ref: 004057CC
                              Strings
                              • Error launching installer, xrefs: 004057A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                              • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                              • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                              • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                              APIs
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp,00000000,00000011,00000002), ref: 004025E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Enum$CloseValue
                              • String ID:
                              • API String ID: 397863658-0
                              • Opcode ID: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                              • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                              • Opcode Fuzzy Hash: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                              • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                              APIs
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nssB5BF.tmp,00000000,00000011,00000002), ref: 004025E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID:
                              • API String ID: 3356406503-0
                              • Opcode ID: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                              • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                              • Opcode Fuzzy Hash: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                              • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                              • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                              • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                              • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                              APIs
                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                              • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CloseDeleteValue
                              • String ID:
                              • API String ID: 2831762973-0
                              • Opcode ID: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                              • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                              • Opcode Fuzzy Hash: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                              • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                              APIs
                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStringslstrcmp
                              • String ID:
                              • API String ID: 1938659011-0
                              • Opcode ID: ce4306d2a07f27be9225dd95e0d9a06ea23b17b85f17c9412fffb0a9b71968b5
                              • Instruction ID: c1865f8cc46f1228928c2992524d711605dd36016a3aefe194dc66e9efe750da
                              • Opcode Fuzzy Hash: ce4306d2a07f27be9225dd95e0d9a06ea23b17b85f17c9412fffb0a9b71968b5
                              • Instruction Fuzzy Hash: 24F08231705201DBCB20DF769D04A9BBFA4EF91354B10803BE145F6190D6788502CA68
                              APIs
                              • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                              • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                              • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                              • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                              • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                                • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                              • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                              • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                              • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\LkzvfB4VFj.exe,80000000,00000003), ref: 00405C94
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                              • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                              • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                              • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405767
                              • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405775
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                              • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                              • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                              • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                              APIs
                              • VirtualAllocEx.KERNELBASE(00000000), ref: 701A2AF7
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: c90d68a00b14a2df6ecd13565271d53ba9eef669d59c0467d0ec5a323a846406
                              • Instruction ID: 3727aef5cd029d2b4076968ac92cc24ec310892eca6af605dc751f08a12417c7
                              • Opcode Fuzzy Hash: c90d68a00b14a2df6ecd13565271d53ba9eef669d59c0467d0ec5a323a846406
                              • Instruction Fuzzy Hash: 1241A0FB500204DFDB21DFA9DD82B9E3775EB94718F3044A9F605E7A60C774A880AB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                              • Instruction ID: 7f5a5d1368c13d317d2e99ee4d98356b480ceadea176dd08c5889da6900fd1c4
                              • Opcode Fuzzy Hash: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                              • Instruction Fuzzy Hash: 7E21B730D04299FADF328BA885886AEBB749F11314F1440BFE491B73D1C2BD8A85DB19
                              APIs
                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FileMove
                              • String ID:
                              • API String ID: 3562171763-0
                              • Opcode ID: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                              • Instruction ID: c16fe538d576f0a812f108a5c598968f2bbae53de2c44bc87e09c6d73b5458c5
                              • Opcode Fuzzy Hash: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                              • Instruction Fuzzy Hash: EEF01D3160852496DB20ABA54E49E5F3264DB42769B24033BF422B21D1EABC8542956E
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402749
                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                              • Instruction ID: d2cb0ca5e863be2ef59b536234997f243a65a7806d73518010ac019a9530af38
                              • Opcode Fuzzy Hash: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                              • Instruction Fuzzy Hash: 7EE09271B00114EED711FBA4AE49DBF77B8EB40315B10403BF102F10C1CABC49128A2E
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                              • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                              • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                              • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                              APIs
                              • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: PathSearch
                              • String ID:
                              • API String ID: 2203818243-0
                              • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                              • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                              • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                              • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                              • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                              • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                              • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,00000004,00000000,00000000,00000000), ref: 00405D1C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                              • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                              • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                              • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                              APIs
                              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,00000004,00000000), ref: 00405D4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                              • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                              • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                              • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                              APIs
                              • VirtualProtect.KERNELBASE(701A404C,00000004,00000040,701A403C), ref: 701A293F
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 22eca9fcbc3e849fe7c25149fe59ad040887604ea12a7ee42e056305c2857765
                              • Instruction ID: e59395c2befdffbdc0131f92e9d0a6e2bd99b2da2246824c0c074aa931634185
                              • Opcode Fuzzy Hash: 22eca9fcbc3e849fe7c25149fe59ad040887604ea12a7ee42e056305c2857765
                              • Instruction Fuzzy Hash: 0BF092F7508280DFC360CF7A8E447863EE0A398254B22857AF798D6A62E3B45044AB11
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402413
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                              • Instruction ID: ec2b9ed2aa8753cc56e49b6d1f5b0ead50a941972cde74363bc07da0fbfd84e4
                              • Opcode Fuzzy Hash: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                              • Instruction Fuzzy Hash: 40E04630904208BAEB006FA08E09EAD3A79EF01710F20003AF9617B0D1E6B89482D72E
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0042A070,?,?,0040600B,0042A070,?,?,?,00000002,Call), ref: 00405FA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                              • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                              • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                              • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                              • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                              • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                              • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                              • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                              • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                              • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                              APIs
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406586
                                • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                              • String ID:
                              • API String ID: 2972824698-0
                              • Opcode ID: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                              • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                              • Opcode Fuzzy Hash: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                              • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                              • Instruction ID: c67a8691079fc4563931701ff3f7f14ff0a893aaeadd9329411c5994133067d8
                              • Opcode Fuzzy Hash: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                              • Instruction Fuzzy Hash: 0CD05E73B10100DBD720EBB8BAC485F77B8EB503253308837E402E2091E579C8424628
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 004053BB
                              • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                              • GetClientRect.USER32(?,?), ref: 00405407
                              • GetSystemMetrics.USER32(00000002), ref: 0040540E
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405496
                              • ShowWindow.USER32(?,00000008), ref: 004054AA
                              • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                              • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                                • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                              • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                              • CreateThread.KERNEL32(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                              • CloseHandle.KERNEL32(00000000), ref: 00405531
                              • ShowWindow.USER32(00000000), ref: 00405554
                              • ShowWindow.USER32(?,00000008), ref: 0040555B
                              • ShowWindow.USER32(00000008), ref: 004055A1
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                              • CreatePopupMenu.USER32 ref: 004055E6
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055FB
                              • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                              • OpenClipboard.USER32(00000000), ref: 00405680
                              • EmptyClipboard.USER32 ref: 00405686
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 0040568F
                              • GlobalLock.KERNEL32(00000000), ref: 00405699
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                              • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                              • SetClipboardData.USER32(00000001,00000000), ref: 004056D1
                              • CloseClipboard.USER32 ref: 004056D7
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID:
                              • API String ID: 590372296-0
                              • Opcode ID: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                              • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                              • Opcode Fuzzy Hash: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                              • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                              • SetWindowTextA.USER32(00000000,?), ref: 00404686
                              • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                              • CoTaskMemFree.OLE32(00000000), ref: 00404742
                              • lstrcmpiA.KERNEL32(Call,0042A890), ref: 00404774
                              • lstrcatA.KERNEL32(?,Call), ref: 00404780
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                                • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                                • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\LkzvfB4VFj.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                                • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                                • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\LkzvfB4VFj.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                                • Part of subcall function 004063D2: CharPrevA.USER32(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                              • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,00000001,00429860,?,?,000003FB,?), ref: 00404850
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                                • Part of subcall function 004049C4: lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                                • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\tranchet$Call$z4x
                              • API String ID: 2624150263-271031951
                              • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                              • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                              • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                              • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                              APIs
                                • Part of subcall function 701A1215: GlobalAlloc.KERNEL32(00000040,701A1233,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A121D
                              • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 701A1BC4
                              • lstrcpyA.KERNEL32(00000008,?), ref: 701A1C0C
                              • lstrcpyA.KERNEL32(00000408,?), ref: 701A1C16
                              • GlobalFree.KERNEL32(00000000), ref: 701A1C29
                              • GlobalFree.KERNEL32(?), ref: 701A1D09
                              • GlobalFree.KERNEL32(?), ref: 701A1D0E
                              • GlobalFree.KERNEL32(?), ref: 701A1D13
                              • GlobalFree.KERNEL32(00000000), ref: 701A1EFA
                              • lstrcpyA.KERNEL32(?,?), ref: 701A2098
                              • GetModuleHandleA.KERNEL32(00000008), ref: 701A2114
                              • LoadLibraryA.KERNEL32(00000008), ref: 701A2125
                              • GetProcAddress.KERNEL32(?,?), ref: 701A217E
                              • lstrlenA.KERNEL32(00000408), ref: 701A2198
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                              • String ID:
                              • API String ID: 245916457-0
                              • Opcode ID: 1915950d304a87123c2f264d9c3a92f9f3fba062d0b0d66b84990a455eac6438
                              • Instruction ID: 1dc7cfc0c7f549298e90333f940f23b9edd847f931f094fd8a39f1165fa3e576
                              • Opcode Fuzzy Hash: 1915950d304a87123c2f264d9c3a92f9f3fba062d0b0d66b84990a455eac6438
                              • Instruction Fuzzy Hash: DD22BDF9D0424ADFCB128FA8C9807ADBBF9FB05314F22456EE196E3684DB745981CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                              • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                              • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                              • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                              • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                              • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                              • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                              • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BF3
                              • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C0A
                              • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C36
                              • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C60
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C7C
                              • DeleteObject.GDI32(00000110), ref: 00404C81
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                              • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D82
                                • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                              • ShowWindow.USER32(?,00000005), ref: 00404DE2
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F7B
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                              • ImageList_Destroy.COMCTL32(?), ref: 00404FB0
                              • GlobalFree.KERNEL32(?), ref: 00404FC0
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                              • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040511B
                              • ShowWindow.USER32(?,00000000), ref: 00405169
                              • GetDlgItem.USER32(?,000003FE), ref: 00405174
                              • ShowWindow.USER32(00000000), ref: 0040517B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N$z4x
                              • API String ID: 2564846305-3559165958
                              • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                              • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                              • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                              • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE3
                              • ShowWindow.USER32(?), ref: 00403D00
                              • DestroyWindow.USER32 ref: 00403D14
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                              • GetDlgItem.USER32(?,?), ref: 00403D51
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                              • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                              • GetDlgItem.USER32(?,00000001), ref: 00403E1A
                              • GetDlgItem.USER32(?,00000002), ref: 00403E24
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E8F
                              • GetDlgItem.USER32(?,00000003), ref: 00403F35
                              • ShowWindow.USER32(00000000,?), ref: 00403F56
                              • EnableWindow.USER32(?,?), ref: 00403F68
                              • EnableWindow.USER32(?,?), ref: 00403F83
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F99
                              • EnableMenuItem.USER32(00000000), ref: 00403FA0
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB8
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FCB
                              • lstrlenA.KERNEL32(0042A890,?,0042A890,00000000), ref: 00403FF5
                              • SetWindowTextA.USER32(?,0042A890), ref: 00404004
                              • ShowWindow.USER32(?,0000000A), ref: 00404138
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 184305955-0
                              • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                              • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                              • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                              • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404371
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404385
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043A3
                              • GetSysColor.USER32(?), ref: 004043B4
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                              • lstrlenA.KERNEL32(?), ref: 004043D5
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                              • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                              • SendMessageA.USER32(00000000), ref: 0040445E
                              • GetDlgItem.USER32(?,000003E8), ref: 00404489
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                              • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                              • SetCursor.USER32(00000000), ref: 004044E1
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                              • SetCursor.USER32(00000000), ref: 004044FA
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404526
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040453A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: Call$N$z4x
                              • API String ID: 3103080414-4268862537
                              • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                              • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                              • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                              • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,Aftopningen Setup,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: Aftopningen Setup$F
                              • API String ID: 941294808-62578608
                              • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                              • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                              • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                              • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                              • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                                • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                              • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                              • wsprintfA.USER32 ref: 00405DDB
                              • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,00000004,0042CA20,?,?,?,?,?), ref: 00405E16
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E25
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                              • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                              • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\LkzvfB4VFj.exe,80000000,00000003), ref: 00405C94
                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                              • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                              • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                              • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 701A2447
                                • Part of subcall function 701A1224: lstrcpynA.KERNEL32(00000000,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A1234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 701A23C2
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 701A23D7
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 701A23E8
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 701A23F6
                              • GlobalFree.KERNEL32(00000000), ref: 701A23FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID: @H3w
                              • API String ID: 3730416702-4275297014
                              • Opcode ID: 223d28e353b9f72e5c6efe565c0039c4c3ebee2da5b255a583defaacaac09128
                              • Instruction ID: 81c151db388eff8e323e7a7f4ae2c88ddf846b7163e5fa571ae26a1d0510a120
                              • Opcode Fuzzy Hash: 223d28e353b9f72e5c6efe565c0039c4c3ebee2da5b255a583defaacaac09128
                              • Instruction Fuzzy Hash: BD419CFA508300DFE7118F28C944B6EB7E8FF49311F2148AAF546E6A91DB74E9048B61
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\LkzvfB4VFj.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                              • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\LkzvfB4VFj.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                              • CharPrevA.USER32(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004063D3
                              • *?|<>/":, xrefs: 0040641A
                              • "C:\Users\user\Desktop\LkzvfB4VFj.exe", xrefs: 0040640E
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\LkzvfB4VFj.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                              • API String ID: 589700163-503979367
                              • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                              • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                              • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                              • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                              • GetSysColor.USER32(00000000), ref: 0040423D
                              • SetTextColor.GDI32(?,00000000), ref: 00404249
                              • SetBkMode.GDI32(?,?), ref: 00404255
                              • GetSysColor.USER32(?), ref: 00404268
                              • SetBkColor.GDI32(?,?), ref: 00404278
                              • DeleteObject.GDI32(?), ref: 00404292
                              • CreateBrushIndirect.GDI32(?), ref: 0040429C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                              • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                              • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                              • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                              APIs
                                • Part of subcall function 701A1215: GlobalAlloc.KERNEL32(00000040,701A1233,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A121D
                              • GlobalFree.KERNEL32(?), ref: 701A25DE
                              • GlobalFree.KERNEL32(00000000), ref: 701A2618
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 05654a76f4380a55fea7bfafc7d2ddc5bee22f7b64cd7ac19a0a3c173a8b3e67
                              • Instruction ID: 96b08e8f70e59bab37ba26ce0f88e0c1f79ae37e9cb9428b8d351be4919e35bb
                              • Opcode Fuzzy Hash: 05654a76f4380a55fea7bfafc7d2ddc5bee22f7b64cd7ac19a0a3c173a8b3e67
                              • Instruction Fuzzy Hash: 7F41B3F6908200EFD3068F58CD95EAE77BAFB85310B2145ADF541A7610DB35AD04DB61
                              APIs
                              • lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                              • lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                              • lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                              • SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                              • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                              • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                              • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE9
                              • GetMessagePos.USER32 ref: 00404AF1
                              • ScreenToClient.USER32(?,?), ref: 00404B0B
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                              • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                              • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                              • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                              • MulDiv.KERNEL32(000D88A0,00000064,000D9EA0), ref: 00402E00
                              • wsprintfA.USER32 ref: 00402E10
                              • SetWindowTextA.USER32(?,?), ref: 00402E20
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                              Strings
                              • verifying installer: %d%%, xrefs: 00402E0A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                              • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                              • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                              • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                              • GlobalFree.KERNEL32(?), ref: 0040288E
                              • GlobalFree.KERNEL32(00000000), ref: 004028A1
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: beba846adb1f70f6b22eee96f90f19e84fa873afe44316901df1c8f09a6901a2
                              • Instruction ID: 50ad9526884773a844389ca9465edd1da2989015e588fa45899e7f45ead5980e
                              • Opcode Fuzzy Hash: beba846adb1f70f6b22eee96f90f19e84fa873afe44316901df1c8f09a6901a2
                              • Instruction Fuzzy Hash: 78216D72800128BBDF217FA5CE49D9E7A79EF09364F24423EF550762D1CA794D418FA8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: e34f40a872f1bd9e679ef93b2b469ccd2e358b8cbaf43bde5955d80cf9faf550
                              • Instruction ID: a2013f1199a8c6c1d94e37fb8312f8d04963a2e5e98c5b2f995d5cca50b615ac
                              • Opcode Fuzzy Hash: e34f40a872f1bd9e679ef93b2b469ccd2e358b8cbaf43bde5955d80cf9faf550
                              • Instruction Fuzzy Hash: E25129FED001D4AEDB028FB8C9545AFBBBAAB44369F27005EE406E3B54C631AE41C751
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 00401D7E
                              • GetClientRect.USER32(?,?), ref: 00401DCC
                              • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                              • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                              • DeleteObject.GDI32(00000000), ref: 00401E20
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                              • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                              • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                              • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                              APIs
                              • lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                              • wsprintfA.USER32 ref: 00404A6A
                              • SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                              • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                              • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                              • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403335,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A95
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403335,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A9E
                              • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405AAF
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405A8F
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                              • API String ID: 2659869361-2382934351
                              • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                              • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                              • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                              • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                              APIs
                              • DestroyWindow.USER32(00000000,00000000,0040301B,00000001), ref: 00402E50
                              • GetTickCount.KERNEL32 ref: 00402E6E
                              • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                              • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                              • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                              • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                              • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                              APIs
                                • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,Aftopningen Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B36
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                              • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405BD0
                              • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BE0
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405B7D
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                              • API String ID: 3248276644-2382934351
                              • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                              • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                              • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                              • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                              APIs
                              • IsWindowVisible.USER32(?), ref: 004051C1
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                                • Part of subcall function 004041C7: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                              • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                              • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                              • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                              APIs
                              • FreeLibrary.KERNEL32(701A0000,771B3410,00000000,C:\Users\user~1\AppData\Local\Temp\,0040384D,00403667,?,?,00000007,00000009,0000000B), ref: 0040388F
                              • GlobalFree.KERNEL32(0077C3B8), ref: 00403896
                              Strings
                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403875
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                              • API String ID: 1100898210-2382934351
                              • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                              • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                              • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                              • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\LkzvfB4VFj.exe,C:\Users\user\Desktop\LkzvfB4VFj.exe,80000000,00000003), ref: 00405ADC
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\LkzvfB4VFj.exe,C:\Users\user\Desktop\LkzvfB4VFj.exe,80000000,00000003), ref: 00405AEA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-3976562730
                              • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                              • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                              • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                              • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 701A115B
                              • GlobalFree.KERNEL32(00000000), ref: 701A11B4
                              • GlobalFree.KERNEL32(?), ref: 701A11C7
                              • GlobalFree.KERNEL32(?), ref: 701A11F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3740655137.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                              • Associated: 00000000.00000002.3740379667.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740894963.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.3740913757.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_701a0000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: cfda4b83430542c03f2a79b5338db6c2d0eed32e03a3f67637e7157e54025028
                              • Instruction ID: e9fb8a53efa59c2db48b5a5b55ed9b594a6aa2f62992dbf273ef1ad4b6ce36ad
                              • Opcode Fuzzy Hash: cfda4b83430542c03f2a79b5338db6c2d0eed32e03a3f67637e7157e54025028
                              • Instruction Fuzzy Hash: 8E31AFFA504244AFD7018F75DE49B6E7FF9FB45250B36452AFA46C2B20DB74E8009B20
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                              • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                              Memory Dump Source
                              • Source File: 00000000.00000002.3733953812.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.3733892029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3733984017.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734010963.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3734215138.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_LkzvfB4VFj.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                              • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                              • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                              • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8