Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
O0rhQM49FL.exe

Overview

General Information

Sample name:O0rhQM49FL.exe
renamed because original name is a hash value
Original sample name:790c5087d3ac8bcb31692aeeff33d8bd.exe
Analysis ID:1554163
MD5:790c5087d3ac8bcb31692aeeff33d8bd
SHA1:31651db12da5f7ccb9db23479944c5dbdd775cc3
SHA256:41b20077c10a3cef5e1ec961fc259dc4c41ccf873c2e33105086bc968a547895
Tags:exeGuLoaderuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • O0rhQM49FL.exe (PID: 6348 cmdline: "C:\Users\user\Desktop\O0rhQM49FL.exe" MD5: 790C5087D3AC8BCB31692AEEFF33D8BD)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-12T07:46:54.053337+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549704TCP
2024-11-12T07:47:14.558797+010020229301A Network Trojan was detected4.175.87.197443192.168.2.557483TCP
2024-11-12T07:47:16.397189+010020229301A Network Trojan was detected4.175.87.197443192.168.2.557494TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: O0rhQM49FL.exeAvira: detected
Source: O0rhQM49FL.exeReversingLabs: Detection: 75%
Source: O0rhQM49FL.exeVirustotal: Detection: 40%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.6% probability
Source: O0rhQM49FL.exeJoe Sandbox ML: detected
Source: O0rhQM49FL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: O0rhQM49FL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00406362 FindFirstFileW,FindClose,0_2_00406362
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00405810 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405810
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:57483
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:57494
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49704
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: O0rhQM49FL.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_004052BD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052BD
Source: C:\Users\user\Desktop\O0rhQM49FL.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_004066E30_2_004066E3
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00404AFA0_2_00404AFA
Source: O0rhQM49FL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@1/10@1/0
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_0040457E GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040457E
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
Source: C:\Users\user\Desktop\O0rhQM49FL.exeFile created: C:\Users\user\AppData\Roaming\unnauseatingJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeFile created: C:\Users\user\AppData\Local\Temp\nsaADEC.tmpJump to behavior
Source: O0rhQM49FL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\O0rhQM49FL.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: O0rhQM49FL.exeReversingLabs: Detection: 75%
Source: O0rhQM49FL.exeVirustotal: Detection: 40%
Source: C:\Users\user\Desktop\O0rhQM49FL.exeFile read: C:\Users\user\Desktop\O0rhQM49FL.exeJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: O0rhQM49FL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
Source: C:\Users\user\Desktop\O0rhQM49FL.exeFile created: C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\O0rhQM49FL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\O0rhQM49FL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00406362 FindFirstFileW,FindClose,0_2_00406362
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00405810 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405810
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
Source: O0rhQM49FL.exe, 00000000.00000002.3895030700.00000000004B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
Source: C:\Users\user\Desktop\O0rhQM49FL.exeAPI call chain: ExitProcess graph end nodegraph_0-4459
Source: C:\Users\user\Desktop\O0rhQM49FL.exeAPI call chain: ExitProcess graph end nodegraph_0-4454
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
Source: C:\Users\user\Desktop\O0rhQM49FL.exeCode function: 0_2_00406041 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406041
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
O0rhQM49FL.exe75%ReversingLabsWin32.Trojan.Guloader
O0rhQM49FL.exe40%VirustotalBrowse
O0rhQM49FL.exe100%AviraHEUR/AGEN.1338065
O0rhQM49FL.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorO0rhQM49FL.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1554163
      Start date and time:2024-11-12 07:45:43 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 39s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:O0rhQM49FL.exe
      renamed because original name is a hash value
      Original Sample Name:790c5087d3ac8bcb31692aeeff33d8bd.exe
      Detection:MAL
      Classification:mal64.winEXE@1/10@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 48
      • Number of non-executed functions: 32
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
        5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
          K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
            K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
              JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                Certificado FNMT-RCM.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  Produccion.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                    SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                      SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.655335921632966
                        Encrypted:false
                        SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                        MD5:EE260C45E97B62A5E42F17460D406068
                        SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                        SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                        SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 0%, Browse
                        Joe Sandbox View:
                        • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                        • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                        • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                        • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                        • Filename: JOSXXL1.exe, Detection: malicious, Browse
                        • Filename: Certificado FNMT-RCM.exe, Detection: malicious, Browse
                        • Filename: Produccion.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-52, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 131072.000000
                        Category:dropped
                        Size (bytes):207459
                        Entropy (8bit):1.2536505141409813
                        Encrypted:false
                        SSDEEP:768:Ghtfcjdl7B4HFhjtk3HygmYU3dFBNDqe0D0oMMM1Rl5nSo+H5/L78K88UP+StFJW:h7kk3H6gDwen8K8NP/Uk
                        MD5:E936802092C4A52237C7BD810EA597BD
                        SHA1:522FC32E5B91B1355AB6CCF867BBE460A2074D8D
                        SHA-256:5D97E55B1D8386EE7B5646BEF445C737E901B6159E11C40EE92CAF4230912D8C
                        SHA-512:5823AE9A49C3E8B4148539EAF114B1C9C0B36D429388FBE55C0FA36D9688AEAB709AF2ADCAC81EE3DDA2277CF6AE46248CB8440C85F6A188164F0EB7DB59154B
                        Malicious:false
                        Reputation:low
                        Preview:.............................................................1...............................................................................t..................................$...............................P..<........................................................)...................=..........................................#.............v..........................%..............w............................................v.............................S...y............\.........................u.....................0.....i....2......c...................................5.......................................6........................r............Z..................Mb............|........................................................................................-...G...........................................................................a....................................................................%........T...................................,...........H<........K..
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):380682
                        Entropy (8bit):1.2431805115448975
                        Encrypted:false
                        SSDEEP:768:Z8cPjkGnKotIXwPEXiPaGjqAX/d6fmwrG9ilAOwaKf4ntqFnIvhjkg8nsAgadk9Q:TuKepHHsNotEFfJKv1Oreux
                        MD5:D709EF4801A3186A717D71B92E31A526
                        SHA1:F77A4F6A643E712215059D361A7E841F2901781A
                        SHA-256:1443833EE2D07DCBD407C8BF98458BE7344936803B6E6CC66A8A0CE65162A6B8
                        SHA-512:454B887A1BF3C80DF5AAB2E2025E4386A6A3177C780210A8CD672CEFB7C429DDDB0464FD3FF4F62C6A5C06A079A628CAC24F0FBE2EA2BEC51A82E5D3F3EA5CFE
                        Malicious:false
                        Reputation:low
                        Preview:..............................................f..j....................u................._..].....................+.....................M..-...~..........................c.....................j................!......................U...........................................................................L..................................................4...............................................................l...X........o.............................z...................$.............................J.....Gz......./.......R....N.........................<.........................................................................................................../............................................................t..............................................I......................................................7....... ...............................Z........................\.........!......................g........................................>...................
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):449864
                        Entropy (8bit):1.247783628619607
                        Encrypted:false
                        SSDEEP:1536:HqJh/ATbW1EfXCeNHBttJPqvdcclgot7JFz:YITbW2XNH7w1r
                        MD5:6B1226170EA4A187DDD3A92FEDF60FC2
                        SHA1:AE5953F4ACB2F06C4BFBA0A72B70FBA731C1F071
                        SHA-256:1663F17B215D69B0DD4FE76F1205C519274B35AE9247BCA25A7DF10963BCD098
                        SHA-512:7A1D84DA64E16E0C6AE1BAE33536A4FF52983E5EB428076D12B042ACED39E2EA753D49CE836582182E9C103225BB2F985A5E9737E05F61799A981044255314AA
                        Malicious:false
                        Reputation:low
                        Preview:.......................%.?..........................._...........................................................).................,..................................................M........I...=..........................................................................................................5.......................S..................................v.......................................$........^............................................................................................../.....................................B.,...........................................................................).............3..s................6..........4............................m.....i....................................>................................1...........0..............8..........................l......................^......K..........................=.......0..............................P.w=..................M.......................................................
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):482597
                        Entropy (8bit):1.2590354656104417
                        Encrypted:false
                        SSDEEP:1536:rZssaKQihGkb32VhaO5owlBkYkEDGo8WGhnCGkxY3/0:geRGV753lBBy1
                        MD5:F8D1E46E500E5C7570DE2B725A975408
                        SHA1:EA669C238D7603FDF1DFDF8D011DF6B571DC3FF9
                        SHA-256:2B5FAA981F69751310763DA468FE809F78D4E2686DCEF4DF9BB55D38038742D6
                        SHA-512:07AB37AA1A503E0AA75246DC17B3C2EDD7B8DEB5B9DE2970853948A01B245E6B348A5D35DA5EBF6D10742811E69FE078BD38C6BE53C4B3CC72CC2C9893C703C0
                        Malicious:false
                        Reputation:low
                        Preview:.......................#A...%...........r..............................~.............A..........................................................................................................r....X..............................<..........................................:................................................................................................................F..A...................................l.......-............................................Q..z.............................................................=..................................................................................................z......p........................c...............................|.........'.............................................................U.............................c...........8M............................u.............................................................................................i.........................................v...............
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):346219
                        Entropy (8bit):1.2585443782674604
                        Encrypted:false
                        SSDEEP:768:/IZ7142zwQF6SqkeP5fL+3X+AS9DrX3nKTDmEY6t+teqC5P780xQ470MIXYO/fqN:UePrnj6eY880p7rOMy
                        MD5:136478E934BC4F767F5C91D1DEDEBDF2
                        SHA1:E78EB2B38A967AFEC85E379F0087749E88120670
                        SHA-256:58347F454F637EBA9B11E042BDD5B0A839B355275B9EAEC50A8B2310F15EFF0E
                        SHA-512:5CC094F3F8C494FF43D29BEAB1D4C1A90C54BE3A16E426F858C13A816A7EFBA3AC0F7B248EA9CBD23CAA83A5B000C497E1411D32713813B7941C2ABCC3882ABE
                        Malicious:false
                        Preview:.................!.....w....k...+.............................................................m............................................r.....h.U..U...................................C.............................................................................u...........)....................................>...........M..........................L............................z....D............i........................................*..........................................7................................8......^..0............................f................G.........E....b.............,......`.........................7.............T.............6..a........................?..................................'....................j...........................................l....................{..........l...............................................J.....................................................................-...........................................................
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:DIY-Thermocam raw data (Lepton 2.x), scale -30464-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 536870912.000000
                        Category:dropped
                        Size (bytes):356375
                        Entropy (8bit):1.2573936831170125
                        Encrypted:false
                        SSDEEP:1536:WlcCJQshKmWk27Ef3zc+GGW3O7lCwJPWf5Ih:7CJQshXWh7X+GGKAldPWfK
                        MD5:C17BFAE545286D575D409AE2AA2FB72B
                        SHA1:417FEE501801F2972A4F7AF23CB10DB6391913CF
                        SHA-256:BAFA32CC496EEF69EA2259E923921C03B2029F4C21CDC54E1297398DFE7DC607
                        SHA-512:111FA5922F8B28CCFAE0051BE5E1B0D68007919E03578C866626D03C280B4DCDF9142DE6C915A0AF0FFD0049FF21434836F723EF755647A805B6505103541C0E
                        Malicious:false
                        Preview:....................................................T.....D...........................................%..>.............................t.....T.........................................................E.....................................................~.......d.......l.............................y.............\............................G...........................6............y........................................`................................................................................................................................................................k.........y...........................9...........................6................).......i.......a...........Q........^................./.................................................'.............G..............................p........................,............O..................3.....................................d...................................=......................L..Z.......................
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):540
                        Entropy (8bit):4.278596950204376
                        Encrypted:false
                        SSDEEP:12:UThkps/WLfKANL7g8cIujd0QRSAqFPFOBedH0er:+mLfKAZ7gIe7RSAqFMu0k
                        MD5:F1FE2A8E12DF3CAEE73577A6EA2DC9CE
                        SHA1:336323D16A4C57C2D6C83E8ECCF95FDDBBC42F0B
                        SHA-256:F9BD8E4D9ACF3161013E0D9DD32B16BAD06FC9A415957EFCEAF034A548F5D3D5
                        SHA-512:521EEFBE1D6B7888D80F008A01175B877FA7776AB1B9F3D3C52DA4BD5C06FC1CF74FEC85A720E113D072651CC92ADB6E085B70C6F1911CF70F2F7D51CA402511
                        Malicious:false
                        Preview:sammensvrgelsers regives achromatous pantostomata railleres nagler tril rdklverne brutality..rutediagrams udmajningens hypervigilantly fejlstatistikkers simmeringly preanaesthetic,ordainment leverandrkonto folkegrupper amyotrophic undeciman southernisms snerpedes ethylenoid blokade gaardvagter..timetalsreduktionerne psalmody lgformet prequotation electroencephalograms.maggas shortens roalls gudsforhold reproppen glossingly rabatkupon reclamatory..oksers klagefristernes separationsbevillingerne savtnder nondefensibility unspiritualise.
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):455582
                        Entropy (8bit):2.6521022366611353
                        Encrypted:false
                        SSDEEP:1536:ZPTRAYO8ei2wVC05XwbttTmLQO+2/5KD8vindf5vVvg550MWXFiWzm8lhU3yiJtg:ZLKIA6qXsd+4rc5URjFbFpdAmup0c33
                        MD5:6B218E856B67EE3890A213EEB3B1EABD
                        SHA1:0CC8FD0CA669692D34D255079A9D1D0F7F862D0A
                        SHA-256:E7C05138FDC5839559BD74C4330559EF35D10E5C26FA6D54C3569E5B3E1E555A
                        SHA-512:4D0FD9AAB757267FD37F8EC9C4BBB05C1CF7957DBA0A09922EF839C7F322D10DB567C16BE481B237649A07FBEC92891D8512FC0C93A2DFF30C6A8FE5C3E7D9A9
                        Malicious:false
                        Preview:006E00C0C0007C00BFBFBF008600C50000CCCCCC000200CF0015002B0034001313130000002C2C002727005300D1D1D1D100380040006200BEBE00000000E3E3E30000000000D0009595950000D300000000E3E3E30060600071009300000000FBFB00D7D700626200006600525200001A00000000320000DEDEDEDE007F006800E000DADA0000009F0000000000007474009700001200007A7A7A00B0B0B0B0003E3E00009500000000000000170000009797007200007C00ECECECECECEC0000E7E7E7000000000000EB00000058005050505000000E0E0E002C000000000000000000E9E9E9E9E9000000008100C3001E1E1E00000F0000310000009D008282828282000000CD00AD006A00494900DDDDDD00004A000000000000000000000000D4D40000000000000000F4F4000000003B00001D0000000000EEEE003E3E3E3E3E3E00000000C80000B30000C0000404000000005C5C5C00F9F9F9000000A3A3A300006D6D6D6D6D0000001010005F5F0019190067009C0000800000006C6C00A80000858500E2E200DBDB0000F1F100000000002B0000A600000000FE000000001C0000F1F1000000ED0000002400E7E7006F00002A00A8A8000000006A6A00005B5B003A3A3A003B3B3B3B007979000000070000C2005E5E005A5A00D1D1D100DC00006B00A900B5008A00760000000000
                        Process:C:\Users\user\Desktop\O0rhQM49FL.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):222948
                        Entropy (8bit):7.513272074889249
                        Encrypted:false
                        SSDEEP:3072:FC6ZnhgwTfLoz+IKIiiHUuDSt/Go5iSHqbKx0d7tbSR2RGiLfX3U95pOncqRrtAi:w2NIiEWtHgjb9GyvUBqou9HPhR
                        MD5:4DFE882409ACEAE4AD5D8A2BFD60BC4E
                        SHA1:DBD456D24B741CA9B4D821EFC17CEB9E8B3C59DC
                        SHA-256:5DFD2D72C607A2979C986E0457E272D43F80305105EF74FC91F1B48483623A0C
                        SHA-512:81D67E19A7A63F21E09E1ED724A5E4DDEDEA7E90BDB71AE616A3224BB56E26873A8A850D12969B75ADBDF8FF56ED81F2788F24CC7E72DD506029965DFF08264B
                        Malicious:false
                        Preview:....3.q................................. ....................LLL......x.m......P...........S...AA.dd.............................................%%%.............vv..........**.a......J...,..L................B.2222...ff.........?.....w..''.........X.....%%.......VV..@..x............ ...............<<.........f.....NNNN.......""..o.............................`.'''''.......................7.......... ................................v.**.......-.mmmm......................l..........................................f........................WW.............;.!..ii...~~~...............=..I....B.v............:...L.X.R...................b.....::::...:...............-............;;.PPP................KKKKKK.E..ccc.11...11.....,................mm........;;....`. ......xxxx........[[.00.II..............dd.......:...1.777.....J.......b............./........`..............,,........;;........FFFF.....7....V................}...........f.0....!..aa.......~....zzzz......~.............i.........../.{{
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.920104487007493
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:O0rhQM49FL.exe
                        File size:755'688 bytes
                        MD5:790c5087d3ac8bcb31692aeeff33d8bd
                        SHA1:31651db12da5f7ccb9db23479944c5dbdd775cc3
                        SHA256:41b20077c10a3cef5e1ec961fc259dc4c41ccf873c2e33105086bc968a547895
                        SHA512:a63731434c5904c373aafee39c339bf96918cc04cedf96f2c02076a7b2bfe925c1f34cce7b355bf77d98fe20562b0e1e13715d39e6a6b54125dd180fb9750b88
                        SSDEEP:12288:bBLbRzUAN15IUNhGjewhrTK84orjGz3E4ArCoEzm+WLk2dtfgqKujNHAGgA:ttgAN1yUNhGjewBKBor/MmtFdtBKujpJ
                        TLSH:81F4236D3F41E932E5338E325E73E999B77A9E015C02090B47157F7F1816863862B39B
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L...s..V.................`...*.....
                        Icon Hash:4d0f060b334d799a
                        Entrypoint:0x40326a
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x567F8473 [Sun Dec 27 06:25:55 2015 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                        Instruction
                        sub esp, 000002D4h
                        push ebp
                        push esi
                        push 00000020h
                        xor ebp, ebp
                        pop esi
                        mov dword ptr [esp+0Ch], ebp
                        push 00008001h
                        mov dword ptr [esp+0Ch], 00409300h
                        mov dword ptr [esp+18h], ebp
                        call dword ptr [004070B0h]
                        call dword ptr [004070ACh]
                        cmp ax, 00000006h
                        je 00007FF824F78E83h
                        push ebp
                        call 00007FF824F7BFC6h
                        cmp eax, ebp
                        je 00007FF824F78E79h
                        push 00000C00h
                        call eax
                        push ebx
                        push edi
                        push 004092F4h
                        call 00007FF824F7BF43h
                        push 004092ECh
                        call 00007FF824F7BF39h
                        push 004092E0h
                        call 00007FF824F7BF2Fh
                        push 00000009h
                        call 00007FF824F7BF94h
                        push 00000007h
                        call 00007FF824F7BF8Dh
                        mov dword ptr [00429224h], eax
                        call dword ptr [00407044h]
                        push ebp
                        call dword ptr [004072A8h]
                        mov dword ptr [004292D8h], eax
                        push ebp
                        lea eax, dword ptr [esp+34h]
                        push 000002B4h
                        push eax
                        push ebp
                        push 004206C8h
                        call dword ptr [0040718Ch]
                        push 004092C8h
                        push 00428220h
                        call 00007FF824F7BB7Ah
                        call dword ptr [004070A8h]
                        mov ebx, 00434000h
                        push eax
                        push ebx
                        call 00007FF824F7BB68h
                        push ebp
                        call dword ptr [00407178h]
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x74bc0xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x8120.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5ffa0x6000df2f822ba33541e61d4a603b60bbdbccFalse0.6675211588541666data6.472885474718374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x70000x13700x1400a10c5fabf76461b1b26713fde2284808False0.4404296875data5.0714431097950134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x90000x203180x60045bc104aba688d708375b6b0133d1563False0.5084635416666666data3.9955723529870646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2a0000x2d0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x570000x81200x8200bbe6ca7856064ad5edda89fbc4e5074aFalse0.29344951923076923data3.7828805104578103IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x574180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22946058091286306
                        RT_ICON0x599c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2870544090056285
                        RT_ICON0x5aa680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.3312899786780384
                        RT_ICON0x5b9100x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3622950819672131
                        RT_ICON0x5c2980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.3704873646209386
                        RT_ICON0x5cb400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.36002304147465436
                        RT_ICON0x5d2080x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.28353658536585363
                        RT_ICON0x5d8700x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.28829479768786126
                        RT_ICON0x5ddd80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.49379432624113473
                        RT_ICON0x5e2400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.39919354838709675
                        RT_ICON0x5e5280x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.48155737704918034
                        RT_ICON0x5e7100x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5337837837837838
                        RT_DIALOG0x5e8380x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x5e9380x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x5ea580xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x5eb200x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x5eb800xaedataEnglishUnited States0.5919540229885057
                        RT_VERSION0x5ec300x1b0dataEnglishUnited States0.5648148148148148
                        RT_MANIFEST0x5ede00x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                        DLLImport
                        KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                        USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                        ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-11-12T07:46:54.053337+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549704TCP
                        2024-11-12T07:47:14.558797+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.557483TCP
                        2024-11-12T07:47:16.397189+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.557494TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Nov 12, 2024 07:47:07.764425039 CET5352413162.159.36.2192.168.2.5
                        Nov 12, 2024 07:47:08.377156019 CET5056853192.168.2.51.1.1.1
                        Nov 12, 2024 07:47:08.383982897 CET53505681.1.1.1192.168.2.5
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Nov 12, 2024 07:47:08.377156019 CET192.168.2.51.1.1.10x5fc5Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Nov 12, 2024 07:47:08.383982897 CET1.1.1.1192.168.2.50x5fc5Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:01:46:33
                        Start date:12/11/2024
                        Path:C:\Users\user\Desktop\O0rhQM49FL.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\O0rhQM49FL.exe"
                        Imagebase:0x400000
                        File size:755'688 bytes
                        MD5 hash:790C5087D3AC8BCB31692AEEFF33D8BD
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:15.9%
                          Dynamic/Decrypted Code Coverage:13.6%
                          Signature Coverage:20.6%
                          Total number of Nodes:1547
                          Total number of Limit Nodes:42
                          execution_graph 4927 10001000 4930 1000101b 4927->4930 4937 10001516 4930->4937 4932 10001020 4933 10001024 4932->4933 4934 10001027 GlobalAlloc 4932->4934 4935 1000153d 3 API calls 4933->4935 4934->4933 4936 10001019 4935->4936 4939 1000151c 4937->4939 4938 10001522 4938->4932 4939->4938 4940 1000152e GlobalFree 4939->4940 4940->4932 4941 402840 4942 402bbf 18 API calls 4941->4942 4944 40284e 4942->4944 4943 402864 4946 405bcf 2 API calls 4943->4946 4944->4943 4945 402bbf 18 API calls 4944->4945 4945->4943 4947 40286a 4946->4947 4969 405bf4 GetFileAttributesW CreateFileW 4947->4969 4949 402877 4950 402883 GlobalAlloc 4949->4950 4951 40291a 4949->4951 4954 402911 CloseHandle 4950->4954 4955 40289c 4950->4955 4952 402922 DeleteFileW 4951->4952 4953 402935 4951->4953 4952->4953 4954->4951 4970 403222 SetFilePointer 4955->4970 4957 4028a2 4958 40320c ReadFile 4957->4958 4959 4028ab GlobalAlloc 4958->4959 4960 4028bb 4959->4960 4961 4028ef 4959->4961 4962 403027 36 API calls 4960->4962 4963 405ca6 WriteFile 4961->4963 4968 4028c8 4962->4968 4964 4028fb GlobalFree 4963->4964 4965 403027 36 API calls 4964->4965 4966 40290e 4965->4966 4966->4954 4967 4028e6 GlobalFree 4967->4961 4968->4967 4969->4949 4970->4957 4971 401cc0 4972 402ba2 18 API calls 4971->4972 4973 401cc7 4972->4973 4974 402ba2 18 API calls 4973->4974 4975 401ccf GetDlgItem 4974->4975 4976 402531 4975->4976 4977 4029c0 4978 402ba2 18 API calls 4977->4978 4979 4029c6 4978->4979 4980 40281e 4979->4980 4981 4029f9 4979->4981 4983 4029d4 4979->4983 4981->4980 4982 406041 18 API calls 4981->4982 4982->4980 4983->4980 4985 405f66 wsprintfW 4983->4985 4985->4980 4006 401fc3 4007 401fd5 4006->4007 4017 402087 4006->4017 4029 402bbf 4007->4029 4009 401423 25 API calls 4013 4021e1 4009->4013 4011 402bbf 18 API calls 4012 401fe5 4011->4012 4014 401ffb LoadLibraryExW 4012->4014 4015 401fed GetModuleHandleW 4012->4015 4016 40200c 4014->4016 4014->4017 4015->4014 4015->4016 4035 406464 WideCharToMultiByte 4016->4035 4017->4009 4020 402056 4083 40517e 4020->4083 4021 40201d 4022 402025 4021->4022 4023 40203c 4021->4023 4080 401423 4022->4080 4038 10001759 4023->4038 4026 40202d 4026->4013 4027 402079 FreeLibrary 4026->4027 4027->4013 4030 402bcb 4029->4030 4094 406041 4030->4094 4033 401fdc 4033->4011 4036 402017 4035->4036 4037 40648e GetProcAddress 4035->4037 4036->4020 4036->4021 4037->4036 4039 10001789 4038->4039 4133 10001b18 4039->4133 4041 10001790 4042 100018a6 4041->4042 4043 100017a1 4041->4043 4044 100017a8 4041->4044 4042->4026 4182 10002286 4043->4182 4165 100022d0 4044->4165 4049 100017cd 4050 1000180c 4049->4050 4051 100017ee 4049->4051 4053 10001812 4050->4053 4054 1000184e 4050->4054 4195 100024a9 4051->4195 4052 100017d7 4052->4049 4192 10002b5f 4052->4192 4058 100015b4 3 API calls 4053->4058 4060 100024a9 10 API calls 4054->4060 4056 100017be 4057 100017c4 4056->4057 4062 100017cf 4056->4062 4057->4049 4176 100028a4 4057->4176 4065 10001828 4058->4065 4066 10001840 4060->4066 4061 100017f4 4206 100015b4 4061->4206 4186 10002645 4062->4186 4069 100024a9 10 API calls 4065->4069 4071 10001895 4066->4071 4217 1000246c 4066->4217 4068 100017d5 4068->4049 4069->4066 4071->4042 4074 1000189f GlobalFree 4071->4074 4074->4042 4077 10001881 4077->4071 4221 1000153d wsprintfW 4077->4221 4078 1000187a FreeLibrary 4078->4077 4081 40517e 25 API calls 4080->4081 4082 401431 4081->4082 4082->4026 4084 405199 4083->4084 4085 40523b 4083->4085 4086 4051b5 lstrlenW 4084->4086 4087 406041 18 API calls 4084->4087 4085->4026 4088 4051c3 lstrlenW 4086->4088 4089 4051de 4086->4089 4087->4086 4088->4085 4090 4051d5 lstrcatW 4088->4090 4091 4051f1 4089->4091 4092 4051e4 SetWindowTextW 4089->4092 4090->4089 4091->4085 4093 4051f7 SendMessageW SendMessageW SendMessageW 4091->4093 4092->4091 4093->4085 4099 40604e 4094->4099 4095 406299 4096 402bec 4095->4096 4128 40601f lstrcpynW 4095->4128 4096->4033 4112 4062b3 4096->4112 4098 406101 GetVersion 4098->4099 4099->4095 4099->4098 4100 406267 lstrlenW 4099->4100 4103 406041 10 API calls 4099->4103 4105 40617c GetSystemDirectoryW 4099->4105 4106 40618f GetWindowsDirectoryW 4099->4106 4107 4062b3 5 API calls 4099->4107 4108 4061c3 SHGetSpecialFolderLocation 4099->4108 4109 406041 10 API calls 4099->4109 4110 406208 lstrcatW 4099->4110 4121 405eec RegOpenKeyExW 4099->4121 4126 405f66 wsprintfW 4099->4126 4127 40601f lstrcpynW 4099->4127 4100->4099 4103->4100 4105->4099 4106->4099 4107->4099 4108->4099 4111 4061db SHGetPathFromIDListW CoTaskMemFree 4108->4111 4109->4099 4110->4099 4111->4099 4113 4062c0 4112->4113 4115 406329 CharNextW 4113->4115 4118 406336 4113->4118 4119 406315 CharNextW 4113->4119 4120 406324 CharNextW 4113->4120 4129 405a00 4113->4129 4114 40633b CharPrevW 4114->4118 4115->4113 4115->4118 4116 40635c 4116->4033 4118->4114 4118->4116 4119->4113 4120->4115 4122 405f60 4121->4122 4123 405f20 RegQueryValueExW 4121->4123 4122->4099 4124 405f41 RegCloseKey 4123->4124 4124->4122 4126->4099 4127->4099 4128->4096 4130 405a06 4129->4130 4131 405a1c 4130->4131 4132 405a0d CharNextW 4130->4132 4131->4113 4132->4130 4224 1000121b GlobalAlloc 4133->4224 4135 10001b3c 4225 1000121b GlobalAlloc 4135->4225 4137 10001d7a GlobalFree GlobalFree GlobalFree 4138 10001d97 4137->4138 4157 10001de1 4137->4157 4139 100020ee 4138->4139 4148 10001dac 4138->4148 4138->4157 4141 10002110 GetModuleHandleW 4139->4141 4139->4157 4140 10001c1d GlobalAlloc 4161 10001b47 4140->4161 4143 10002121 LoadLibraryW 4141->4143 4144 10002136 4141->4144 4142 10001c86 GlobalFree 4142->4161 4143->4144 4143->4157 4232 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4144->4232 4145 10001c68 lstrcpyW 4146 10001c72 lstrcpyW 4145->4146 4146->4161 4148->4157 4228 1000122c 4148->4228 4149 10002188 4151 10002195 lstrlenW 4149->4151 4149->4157 4233 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4151->4233 4152 10002148 4152->4149 4164 10002172 GetProcAddress 4152->4164 4153 10002048 4156 10002090 lstrcpyW 4153->4156 4153->4157 4156->4157 4157->4041 4158 10001cc4 4158->4161 4226 1000158f GlobalSize GlobalAlloc 4158->4226 4159 10001f37 GlobalFree 4159->4161 4160 100021af 4160->4157 4161->4137 4161->4140 4161->4142 4161->4145 4161->4146 4161->4153 4161->4157 4161->4158 4161->4159 4162 1000122c 2 API calls 4161->4162 4231 1000121b GlobalAlloc 4161->4231 4162->4161 4164->4149 4172 100022e8 4165->4172 4167 10002415 GlobalFree 4171 100017ae 4167->4171 4167->4172 4168 100023d3 lstrlenW 4168->4167 4175 100023de 4168->4175 4169 100023ba GlobalAlloc CLSIDFromString 4169->4167 4170 1000238f GlobalAlloc WideCharToMultiByte 4170->4167 4171->4049 4171->4052 4171->4056 4172->4167 4172->4168 4172->4169 4172->4170 4173 1000122c GlobalAlloc lstrcpynW 4172->4173 4235 100012ba 4172->4235 4173->4172 4175->4167 4239 100025d9 4175->4239 4178 100028b6 4176->4178 4177 1000295b VirtualAllocEx 4179 10002979 4177->4179 4178->4177 4180 10002a75 4179->4180 4181 10002a6a GetLastError 4179->4181 4180->4049 4181->4180 4183 10002296 4182->4183 4184 100017a7 4182->4184 4183->4184 4185 100022a8 GlobalAlloc 4183->4185 4184->4044 4185->4183 4190 10002661 4186->4190 4187 100026b2 GlobalAlloc 4191 100026d4 4187->4191 4188 100026c5 4189 100026ca GlobalSize 4188->4189 4188->4191 4189->4191 4190->4187 4190->4188 4191->4068 4193 10002b6a 4192->4193 4194 10002baa GlobalFree 4193->4194 4242 1000121b GlobalAlloc 4195->4242 4197 10002530 StringFromGUID2 4203 100024b3 4197->4203 4198 10002541 lstrcpynW 4198->4203 4199 1000250b MultiByteToWideChar 4199->4203 4200 10002554 wsprintfW 4200->4203 4201 10002571 GlobalFree 4201->4203 4202 100025ac GlobalFree 4202->4061 4203->4197 4203->4198 4203->4199 4203->4200 4203->4201 4203->4202 4204 10001272 2 API calls 4203->4204 4243 100012e1 4203->4243 4204->4203 4247 1000121b GlobalAlloc 4206->4247 4208 100015ba 4210 100015e1 4208->4210 4211 100015c7 lstrcpyW 4208->4211 4212 100015fb 4210->4212 4213 100015e6 wsprintfW 4210->4213 4211->4212 4214 10001272 4212->4214 4213->4212 4215 100012b5 GlobalFree 4214->4215 4216 1000127b GlobalAlloc lstrcpynW 4214->4216 4215->4066 4216->4215 4218 1000247a 4217->4218 4220 10001861 4217->4220 4219 10002496 GlobalFree 4218->4219 4218->4220 4219->4218 4220->4077 4220->4078 4222 10001272 2 API calls 4221->4222 4223 1000155e 4222->4223 4223->4071 4224->4135 4225->4161 4227 100015ad 4226->4227 4227->4158 4234 1000121b GlobalAlloc 4228->4234 4230 1000123b lstrcpynW 4230->4157 4231->4161 4232->4152 4233->4160 4234->4230 4236 100012c1 4235->4236 4237 1000122c 2 API calls 4236->4237 4238 100012df 4237->4238 4238->4172 4240 100025e7 VirtualAlloc 4239->4240 4241 1000263d 4239->4241 4240->4241 4241->4175 4242->4203 4244 100012ea 4243->4244 4245 1000130c 4243->4245 4244->4245 4246 100012f0 lstrcpyW 4244->4246 4245->4203 4246->4245 4247->4208 4986 4016c4 4987 402bbf 18 API calls 4986->4987 4988 4016ca GetFullPathNameW 4987->4988 4989 4016e4 4988->4989 4995 401706 4988->4995 4991 406362 2 API calls 4989->4991 4989->4995 4990 40171b GetShortPathNameW 4992 402a4c 4990->4992 4993 4016f6 4991->4993 4993->4995 4996 40601f lstrcpynW 4993->4996 4995->4990 4995->4992 4996->4995 5007 40194e 5008 402bbf 18 API calls 5007->5008 5009 401955 lstrlenW 5008->5009 5010 402531 5009->5010 5011 4027ce 5012 4027d6 5011->5012 5013 4027da FindNextFileW 5012->5013 5016 4027ec 5012->5016 5014 402833 5013->5014 5013->5016 5017 40601f lstrcpynW 5014->5017 5017->5016 4798 401754 4799 402bbf 18 API calls 4798->4799 4800 40175b 4799->4800 4801 405c23 2 API calls 4800->4801 4802 401762 4801->4802 4803 405c23 2 API calls 4802->4803 4803->4802 5018 4048d4 5019 404900 5018->5019 5020 4048e4 5018->5020 5022 404933 5019->5022 5023 404906 SHGetPathFromIDListW 5019->5023 5029 405748 GetDlgItemTextW 5020->5029 5025 40491d SendMessageW 5023->5025 5026 404916 5023->5026 5024 4048f1 SendMessageW 5024->5019 5025->5022 5027 40140b 2 API calls 5026->5027 5027->5025 5029->5024 5030 401d56 GetDC GetDeviceCaps 5031 402ba2 18 API calls 5030->5031 5032 401d74 MulDiv ReleaseDC 5031->5032 5033 402ba2 18 API calls 5032->5033 5034 401d93 5033->5034 5035 406041 18 API calls 5034->5035 5036 401dcc CreateFontIndirectW 5035->5036 5037 402531 5036->5037 5037->5037 4827 4014d7 4828 402ba2 18 API calls 4827->4828 4829 4014dd Sleep 4828->4829 4831 402a4c 4829->4831 5045 401a57 5046 402ba2 18 API calls 5045->5046 5047 401a5d 5046->5047 5048 402ba2 18 API calls 5047->5048 5049 401a05 5048->5049 5050 40155b 5051 4029f2 5050->5051 5054 405f66 wsprintfW 5051->5054 5053 4029f7 5054->5053 5055 401ddc 5056 402ba2 18 API calls 5055->5056 5057 401de2 5056->5057 5058 402ba2 18 API calls 5057->5058 5059 401deb 5058->5059 5060 401df2 ShowWindow 5059->5060 5061 401dfd EnableWindow 5059->5061 5062 402a4c 5060->5062 5061->5062 5063 4022df 5064 402bbf 18 API calls 5063->5064 5065 4022ee 5064->5065 5066 402bbf 18 API calls 5065->5066 5067 4022f7 5066->5067 5068 402bbf 18 API calls 5067->5068 5069 402301 GetPrivateProfileStringW 5068->5069 5070 401bdf 5071 402ba2 18 API calls 5070->5071 5072 401be6 5071->5072 5073 402ba2 18 API calls 5072->5073 5074 401bf0 5073->5074 5075 401c00 5074->5075 5076 402bbf 18 API calls 5074->5076 5077 401c10 5075->5077 5080 402bbf 18 API calls 5075->5080 5076->5075 5078 401c1b 5077->5078 5079 401c5f 5077->5079 5081 402ba2 18 API calls 5078->5081 5082 402bbf 18 API calls 5079->5082 5080->5077 5083 401c20 5081->5083 5084 401c64 5082->5084 5085 402ba2 18 API calls 5083->5085 5086 402bbf 18 API calls 5084->5086 5087 401c29 5085->5087 5088 401c6d FindWindowExW 5086->5088 5089 401c31 SendMessageTimeoutW 5087->5089 5090 401c4f SendMessageW 5087->5090 5091 401c8f 5088->5091 5089->5091 5090->5091 5092 401960 5093 402ba2 18 API calls 5092->5093 5094 401967 5093->5094 5095 402ba2 18 API calls 5094->5095 5096 401971 5095->5096 5097 402bbf 18 API calls 5096->5097 5098 40197a 5097->5098 5099 40198e lstrlenW 5098->5099 5100 4019ca 5098->5100 5101 401998 5099->5101 5101->5100 5105 40601f lstrcpynW 5101->5105 5103 4019b3 5103->5100 5104 4019c0 lstrlenW 5103->5104 5104->5100 5105->5103 5106 401662 5107 402bbf 18 API calls 5106->5107 5108 401668 5107->5108 5109 406362 2 API calls 5108->5109 5110 40166e 5109->5110 5111 4066e3 5113 406567 5111->5113 5112 406ed2 5113->5112 5114 4065f1 GlobalAlloc 5113->5114 5115 4065e8 GlobalFree 5113->5115 5116 406668 GlobalAlloc 5113->5116 5117 40665f GlobalFree 5113->5117 5114->5112 5114->5113 5115->5114 5116->5112 5116->5113 5117->5116 5118 4019e4 5119 402bbf 18 API calls 5118->5119 5120 4019eb 5119->5120 5121 402bbf 18 API calls 5120->5121 5122 4019f4 5121->5122 5123 4019fb lstrcmpiW 5122->5123 5124 401a0d lstrcmpW 5122->5124 5125 401a01 5123->5125 5124->5125 4248 4025e5 4262 402ba2 4248->4262 4250 4025f4 4251 40263a ReadFile 4250->4251 4253 4026d3 4250->4253 4254 40267a MultiByteToWideChar 4250->4254 4255 40272f 4250->4255 4258 4026a0 SetFilePointer MultiByteToWideChar 4250->4258 4259 402740 4250->4259 4261 40272d 4250->4261 4274 405c77 ReadFile 4250->4274 4251->4250 4251->4261 4253->4250 4253->4261 4265 405cd5 SetFilePointer 4253->4265 4254->4250 4276 405f66 wsprintfW 4255->4276 4258->4250 4260 402761 SetFilePointer 4259->4260 4259->4261 4260->4261 4263 406041 18 API calls 4262->4263 4264 402bb6 4263->4264 4264->4250 4266 405cf1 4265->4266 4267 405d0d 4265->4267 4268 405c77 ReadFile 4266->4268 4267->4253 4269 405cfd 4268->4269 4269->4267 4270 405d16 SetFilePointer 4269->4270 4271 405d3e SetFilePointer 4269->4271 4270->4271 4272 405d21 4270->4272 4271->4267 4277 405ca6 WriteFile 4272->4277 4275 405c95 4274->4275 4275->4250 4276->4261 4278 405cc4 4277->4278 4278->4267 4279 401e66 4280 402bbf 18 API calls 4279->4280 4281 401e6c 4280->4281 4282 40517e 25 API calls 4281->4282 4283 401e76 4282->4283 4297 4056ff CreateProcessW 4283->4297 4286 401edb CloseHandle 4289 40281e 4286->4289 4287 401e8c WaitForSingleObject 4288 401e9e 4287->4288 4290 401eb0 GetExitCodeProcess 4288->4290 4300 406431 4288->4300 4292 401ec2 4290->4292 4293 401ecf 4290->4293 4304 405f66 wsprintfW 4292->4304 4293->4286 4294 401ecd 4293->4294 4294->4286 4298 405732 CloseHandle 4297->4298 4299 401e7c 4297->4299 4298->4299 4299->4286 4299->4287 4299->4289 4301 40644e PeekMessageW 4300->4301 4302 406444 DispatchMessageW 4301->4302 4303 401ea5 WaitForSingleObject 4301->4303 4302->4301 4303->4288 4304->4294 4314 401767 4315 402bbf 18 API calls 4314->4315 4316 40176e 4315->4316 4317 401796 4316->4317 4318 40178e 4316->4318 4376 40601f lstrcpynW 4317->4376 4375 40601f lstrcpynW 4318->4375 4321 401794 4325 4062b3 5 API calls 4321->4325 4322 4017a1 4377 4059d3 lstrlenW CharPrevW 4322->4377 4351 4017b3 4325->4351 4327 4017ef 4383 405bcf GetFileAttributesW 4327->4383 4330 4017c5 CompareFileTime 4330->4351 4331 401885 4333 40517e 25 API calls 4331->4333 4332 40185c 4334 40517e 25 API calls 4332->4334 4342 401871 4332->4342 4336 40188f 4333->4336 4334->4342 4335 40601f lstrcpynW 4335->4351 4354 403027 4336->4354 4339 4018b6 SetFileTime 4341 4018c8 CloseHandle 4339->4341 4340 406041 18 API calls 4340->4351 4341->4342 4343 4018d9 4341->4343 4344 4018f1 4343->4344 4345 4018de 4343->4345 4346 406041 18 API calls 4344->4346 4347 406041 18 API calls 4345->4347 4348 4018f9 4346->4348 4350 4018e6 lstrcatW 4347->4350 4352 405764 MessageBoxIndirectW 4348->4352 4350->4348 4351->4327 4351->4330 4351->4331 4351->4332 4351->4335 4351->4340 4353 405bf4 GetFileAttributesW CreateFileW 4351->4353 4380 406362 FindFirstFileW 4351->4380 4386 405764 4351->4386 4352->4342 4353->4351 4356 403040 4354->4356 4355 40306b 4390 40320c 4355->4390 4356->4355 4401 403222 SetFilePointer 4356->4401 4360 403088 GetTickCount 4371 40309b 4360->4371 4361 4031ac 4362 4031b0 4361->4362 4367 4031c8 4361->4367 4364 40320c ReadFile 4362->4364 4363 4018a2 4363->4339 4363->4341 4364->4363 4365 40320c ReadFile 4365->4367 4366 40320c ReadFile 4366->4371 4367->4363 4367->4365 4368 405ca6 WriteFile 4367->4368 4368->4367 4370 403101 GetTickCount 4370->4371 4371->4363 4371->4366 4371->4370 4372 40312a MulDiv wsprintfW 4371->4372 4374 405ca6 WriteFile 4371->4374 4393 406534 4371->4393 4373 40517e 25 API calls 4372->4373 4373->4371 4374->4371 4375->4321 4376->4322 4378 4017a7 lstrcatW 4377->4378 4379 4059ef lstrcatW 4377->4379 4378->4321 4379->4378 4381 406378 FindClose 4380->4381 4382 406383 4380->4382 4381->4382 4382->4351 4384 405be1 SetFileAttributesW 4383->4384 4385 405bee 4383->4385 4384->4385 4385->4351 4387 405779 4386->4387 4388 4057c5 4387->4388 4389 40578d MessageBoxIndirectW 4387->4389 4388->4351 4389->4388 4391 405c77 ReadFile 4390->4391 4392 403076 4391->4392 4392->4360 4392->4361 4392->4363 4394 406559 4393->4394 4395 406561 4393->4395 4394->4371 4395->4394 4396 4065f1 GlobalAlloc 4395->4396 4397 4065e8 GlobalFree 4395->4397 4398 406668 GlobalAlloc 4395->4398 4399 40665f GlobalFree 4395->4399 4396->4394 4400 406605 4396->4400 4397->4396 4398->4394 4398->4395 4399->4398 4400->4395 4401->4355 5126 100018a9 5128 100018cc 5126->5128 5127 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5130 10001272 2 API calls 5127->5130 5128->5127 5129 100018ff GlobalFree 5128->5129 5129->5127 5131 10001a87 GlobalFree GlobalFree 5130->5131 5132 401ee9 5133 402bbf 18 API calls 5132->5133 5134 401ef0 5133->5134 5135 406362 2 API calls 5134->5135 5136 401ef6 5135->5136 5138 401f07 5136->5138 5139 405f66 wsprintfW 5136->5139 5139->5138 4409 40326a SetErrorMode GetVersion 4410 40329e 4409->4410 4411 4032a4 4409->4411 4412 4063f5 5 API calls 4410->4412 4500 406389 GetSystemDirectoryW 4411->4500 4412->4411 4414 4032bb 4415 406389 3 API calls 4414->4415 4416 4032c5 4415->4416 4417 406389 3 API calls 4416->4417 4418 4032cf 4417->4418 4503 4063f5 GetModuleHandleA 4418->4503 4421 4063f5 5 API calls 4422 4032dd #17 OleInitialize SHGetFileInfoW 4421->4422 4509 40601f lstrcpynW 4422->4509 4424 40331a GetCommandLineW 4510 40601f lstrcpynW 4424->4510 4426 40332c GetModuleHandleW 4427 403344 4426->4427 4428 405a00 CharNextW 4427->4428 4429 403353 CharNextW 4428->4429 4430 40347e GetTempPathW 4429->4430 4440 40336c 4429->4440 4511 403239 4430->4511 4432 403496 4433 4034f0 DeleteFileW 4432->4433 4434 40349a GetWindowsDirectoryW lstrcatW 4432->4434 4521 402dee GetTickCount GetModuleFileNameW 4433->4521 4435 403239 12 API calls 4434->4435 4438 4034b6 4435->4438 4436 405a00 CharNextW 4436->4440 4438->4433 4441 4034ba GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4438->4441 4439 403504 4447 405a00 CharNextW 4439->4447 4484 4035a7 4439->4484 4495 4035b7 4439->4495 4440->4436 4443 403469 4440->4443 4445 403467 4440->4445 4444 403239 12 API calls 4441->4444 4606 40601f lstrcpynW 4443->4606 4450 4034e8 4444->4450 4445->4430 4462 403523 4447->4462 4450->4433 4450->4495 4451 4036f2 4454 403776 ExitProcess 4451->4454 4455 4036fa GetCurrentProcess OpenProcessToken 4451->4455 4452 4035d2 4453 405764 MessageBoxIndirectW 4452->4453 4459 4035e0 ExitProcess 4453->4459 4460 403712 LookupPrivilegeValueW AdjustTokenPrivileges 4455->4460 4461 403746 4455->4461 4457 403581 4607 405adb 4457->4607 4458 4035e8 4630 4056e7 4458->4630 4460->4461 4465 4063f5 5 API calls 4461->4465 4462->4457 4462->4458 4474 40374d 4465->4474 4467 403762 ExitWindowsEx 4467->4454 4471 40376f 4467->4471 4469 403609 lstrcatW lstrcmpiW 4473 403625 4469->4473 4469->4495 4470 4035fe lstrcatW 4470->4469 4647 40140b 4471->4647 4477 403631 4473->4477 4478 40362a 4473->4478 4474->4467 4474->4471 4476 40359c 4622 40601f lstrcpynW 4476->4622 4638 4056ca CreateDirectoryW 4477->4638 4633 40564d CreateDirectoryW 4478->4633 4483 403636 SetCurrentDirectoryW 4485 403651 4483->4485 4486 403646 4483->4486 4549 403868 4484->4549 4642 40601f lstrcpynW 4485->4642 4641 40601f lstrcpynW 4486->4641 4489 406041 18 API calls 4490 403690 DeleteFileW 4489->4490 4491 40369d CopyFileW 4490->4491 4497 40365f 4490->4497 4491->4497 4492 4036e6 4493 405ec0 38 API calls 4492->4493 4493->4495 4623 40378e 4495->4623 4496 406041 18 API calls 4496->4497 4497->4489 4497->4492 4497->4496 4498 4056ff 2 API calls 4497->4498 4499 4036d1 CloseHandle 4497->4499 4643 405ec0 MoveFileExW 4497->4643 4498->4497 4499->4497 4501 4063ab wsprintfW LoadLibraryW 4500->4501 4501->4414 4504 406411 4503->4504 4505 40641b GetProcAddress 4503->4505 4506 406389 3 API calls 4504->4506 4507 4032d6 4505->4507 4508 406417 4506->4508 4507->4421 4508->4505 4508->4507 4509->4424 4510->4426 4512 4062b3 5 API calls 4511->4512 4513 403245 4512->4513 4514 40324f 4513->4514 4515 4059d3 3 API calls 4513->4515 4514->4432 4516 403257 4515->4516 4517 4056ca 2 API calls 4516->4517 4518 40325d 4517->4518 4650 405c23 4518->4650 4654 405bf4 GetFileAttributesW CreateFileW 4521->4654 4523 402e2e 4540 402e3e 4523->4540 4655 40601f lstrcpynW 4523->4655 4525 402e54 4656 405a1f lstrlenW 4525->4656 4529 402e65 GetFileSize 4545 402f61 4529->4545 4548 402e7c 4529->4548 4531 402f6a 4533 402f9a GlobalAlloc 4531->4533 4531->4540 4673 403222 SetFilePointer 4531->4673 4532 40320c ReadFile 4532->4548 4672 403222 SetFilePointer 4533->4672 4535 402fcd 4537 402d8a 6 API calls 4535->4537 4537->4540 4538 402f83 4541 40320c ReadFile 4538->4541 4539 402fb5 4542 403027 36 API calls 4539->4542 4540->4439 4543 402f8e 4541->4543 4546 402fc1 4542->4546 4543->4533 4543->4540 4544 402d8a 6 API calls 4544->4548 4661 402d8a 4545->4661 4546->4540 4546->4546 4547 402ffe SetFilePointer 4546->4547 4547->4540 4548->4532 4548->4535 4548->4540 4548->4544 4548->4545 4550 4063f5 5 API calls 4549->4550 4551 40387c 4550->4551 4552 403882 4551->4552 4553 403894 4551->4553 4683 405f66 wsprintfW 4552->4683 4554 405eec 3 API calls 4553->4554 4555 4038c4 4554->4555 4556 4038e3 lstrcatW 4555->4556 4558 405eec 3 API calls 4555->4558 4559 403892 4556->4559 4558->4556 4674 403b3e 4559->4674 4562 405adb 18 API calls 4563 403915 4562->4563 4564 4039a9 4563->4564 4566 405eec 3 API calls 4563->4566 4565 405adb 18 API calls 4564->4565 4567 4039af 4565->4567 4568 403947 4566->4568 4569 4039bf LoadImageW 4567->4569 4572 406041 18 API calls 4567->4572 4568->4564 4575 403968 lstrlenW 4568->4575 4579 405a00 CharNextW 4568->4579 4570 403a65 4569->4570 4571 4039e6 RegisterClassW 4569->4571 4574 40140b 2 API calls 4570->4574 4573 403a1c SystemParametersInfoW CreateWindowExW 4571->4573 4581 403a6f 4571->4581 4572->4569 4573->4570 4578 403a6b 4574->4578 4576 403976 lstrcmpiW 4575->4576 4577 40399c 4575->4577 4576->4577 4580 403986 GetFileAttributesW 4576->4580 4582 4059d3 3 API calls 4577->4582 4578->4581 4585 403b3e 19 API calls 4578->4585 4583 403965 4579->4583 4584 403992 4580->4584 4581->4495 4586 4039a2 4582->4586 4583->4575 4584->4577 4587 405a1f 2 API calls 4584->4587 4588 403a7c 4585->4588 4684 40601f lstrcpynW 4586->4684 4587->4577 4590 403a88 ShowWindow 4588->4590 4591 403b0b 4588->4591 4593 406389 3 API calls 4590->4593 4685 405251 OleInitialize 4591->4685 4595 403aa0 4593->4595 4594 403b11 4596 403b15 4594->4596 4597 403b2d 4594->4597 4598 403aae GetClassInfoW 4595->4598 4600 406389 3 API calls 4595->4600 4596->4581 4604 40140b 2 API calls 4596->4604 4599 40140b 2 API calls 4597->4599 4601 403ac2 GetClassInfoW RegisterClassW 4598->4601 4602 403ad8 DialogBoxParamW 4598->4602 4599->4581 4600->4598 4601->4602 4603 40140b 2 API calls 4602->4603 4605 403b00 4603->4605 4604->4581 4605->4581 4606->4445 4700 40601f lstrcpynW 4607->4700 4609 405aec 4701 405a7e CharNextW CharNextW 4609->4701 4612 40358d 4612->4495 4621 40601f lstrcpynW 4612->4621 4613 4062b3 5 API calls 4619 405b02 4613->4619 4614 405b33 lstrlenW 4615 405b3e 4614->4615 4614->4619 4617 4059d3 3 API calls 4615->4617 4616 406362 2 API calls 4616->4619 4618 405b43 GetFileAttributesW 4617->4618 4618->4612 4619->4612 4619->4614 4619->4616 4620 405a1f 2 API calls 4619->4620 4620->4614 4621->4476 4622->4484 4624 4037a6 4623->4624 4625 403798 CloseHandle 4623->4625 4707 4037d3 4624->4707 4625->4624 4631 4063f5 5 API calls 4630->4631 4632 4035ed lstrcatW 4631->4632 4632->4469 4632->4470 4634 40362f 4633->4634 4635 40569e GetLastError 4633->4635 4634->4483 4635->4634 4636 4056ad SetFileSecurityW 4635->4636 4636->4634 4637 4056c3 GetLastError 4636->4637 4637->4634 4639 4056da 4638->4639 4640 4056de GetLastError 4638->4640 4639->4483 4640->4639 4641->4485 4642->4497 4644 405ee1 4643->4644 4645 405ed4 4643->4645 4644->4497 4760 405d4e lstrcpyW 4645->4760 4648 401389 2 API calls 4647->4648 4649 401420 4648->4649 4649->4454 4651 405c30 GetTickCount GetTempFileNameW 4650->4651 4652 403268 4651->4652 4653 405c66 4651->4653 4652->4432 4653->4651 4653->4652 4654->4523 4655->4525 4657 405a2d 4656->4657 4658 405a33 CharPrevW 4657->4658 4659 402e5a 4657->4659 4658->4657 4658->4659 4660 40601f lstrcpynW 4659->4660 4660->4529 4662 402d93 4661->4662 4663 402dab 4661->4663 4664 402da3 4662->4664 4665 402d9c DestroyWindow 4662->4665 4666 402db3 4663->4666 4667 402dbb GetTickCount 4663->4667 4664->4531 4665->4664 4670 406431 2 API calls 4666->4670 4668 402dc9 CreateDialogParamW ShowWindow 4667->4668 4669 402dec 4667->4669 4668->4669 4669->4531 4671 402db9 4670->4671 4671->4531 4672->4539 4673->4538 4675 403b52 4674->4675 4692 405f66 wsprintfW 4675->4692 4677 403bc3 4678 406041 18 API calls 4677->4678 4679 403bcf SetWindowTextW 4678->4679 4680 4038f3 4679->4680 4681 403beb 4679->4681 4680->4562 4681->4680 4682 406041 18 API calls 4681->4682 4682->4681 4683->4559 4684->4564 4693 40412f 4685->4693 4687 405274 4690 40529b 4687->4690 4696 401389 4687->4696 4688 40412f SendMessageW 4689 4052ad OleUninitialize 4688->4689 4689->4594 4690->4688 4692->4677 4694 404147 4693->4694 4695 404138 SendMessageW 4693->4695 4694->4687 4695->4694 4698 401390 4696->4698 4697 4013fe 4697->4687 4698->4697 4699 4013cb MulDiv SendMessageW 4698->4699 4699->4698 4700->4609 4702 405a9b 4701->4702 4706 405aad 4701->4706 4704 405aa8 CharNextW 4702->4704 4702->4706 4703 405ad1 4703->4612 4703->4613 4704->4703 4705 405a00 CharNextW 4705->4706 4706->4703 4706->4705 4708 4037e1 4707->4708 4709 4037ab 4708->4709 4710 4037e6 FreeLibrary GlobalFree 4708->4710 4711 405810 4709->4711 4710->4709 4710->4710 4712 405adb 18 API calls 4711->4712 4713 405830 4712->4713 4714 405838 DeleteFileW 4713->4714 4715 40584f 4713->4715 4716 4035c0 OleUninitialize 4714->4716 4718 40597a 4715->4718 4750 40601f lstrcpynW 4715->4750 4716->4451 4716->4452 4718->4716 4724 406362 2 API calls 4718->4724 4719 405875 4720 405888 4719->4720 4721 40587b lstrcatW 4719->4721 4723 405a1f 2 API calls 4720->4723 4722 40588e 4721->4722 4725 40589e lstrcatW 4722->4725 4727 4058a9 lstrlenW FindFirstFileW 4722->4727 4723->4722 4726 405994 4724->4726 4725->4727 4726->4716 4728 405998 4726->4728 4729 40596f 4727->4729 4748 4058cb 4727->4748 4730 4059d3 3 API calls 4728->4730 4729->4718 4731 40599e 4730->4731 4733 4057c8 5 API calls 4731->4733 4732 405952 FindNextFileW 4735 405968 FindClose 4732->4735 4732->4748 4736 4059aa 4733->4736 4735->4729 4737 4059c4 4736->4737 4738 4059ae 4736->4738 4740 40517e 25 API calls 4737->4740 4738->4716 4741 40517e 25 API calls 4738->4741 4740->4716 4743 4059bb 4741->4743 4742 405810 62 API calls 4742->4748 4744 405ec0 38 API calls 4743->4744 4746 4059c2 4744->4746 4745 40517e 25 API calls 4745->4732 4746->4716 4747 40517e 25 API calls 4747->4748 4748->4732 4748->4742 4748->4745 4748->4747 4749 405ec0 38 API calls 4748->4749 4751 40601f lstrcpynW 4748->4751 4752 4057c8 4748->4752 4749->4748 4750->4719 4751->4748 4753 405bcf 2 API calls 4752->4753 4754 4057d4 4753->4754 4755 4057e3 RemoveDirectoryW 4754->4755 4756 4057eb DeleteFileW 4754->4756 4757 4057f5 4754->4757 4758 4057f1 4755->4758 4756->4758 4757->4748 4758->4757 4759 405801 SetFileAttributesW 4758->4759 4759->4757 4761 405d76 4760->4761 4762 405d9c GetShortPathNameW 4760->4762 4787 405bf4 GetFileAttributesW CreateFileW 4761->4787 4764 405db1 4762->4764 4765 405ebb 4762->4765 4764->4765 4767 405db9 wsprintfA 4764->4767 4765->4644 4766 405d80 CloseHandle GetShortPathNameW 4766->4765 4768 405d94 4766->4768 4769 406041 18 API calls 4767->4769 4768->4762 4768->4765 4770 405de1 4769->4770 4788 405bf4 GetFileAttributesW CreateFileW 4770->4788 4772 405dee 4772->4765 4773 405dfd GetFileSize GlobalAlloc 4772->4773 4774 405eb4 CloseHandle 4773->4774 4775 405e1f 4773->4775 4774->4765 4776 405c77 ReadFile 4775->4776 4777 405e27 4776->4777 4777->4774 4789 405b59 lstrlenA 4777->4789 4780 405e52 4782 405b59 4 API calls 4780->4782 4781 405e3e lstrcpyA 4783 405e60 4781->4783 4782->4783 4784 405e97 SetFilePointer 4783->4784 4785 405ca6 WriteFile 4784->4785 4786 405ead GlobalFree 4785->4786 4786->4774 4787->4766 4788->4772 4790 405b9a lstrlenA 4789->4790 4791 405ba2 4790->4791 4792 405b73 lstrcmpiA 4790->4792 4791->4780 4791->4781 4792->4791 4793 405b91 CharNextA 4792->4793 4793->4790 5140 4021ea 5141 402bbf 18 API calls 5140->5141 5142 4021f0 5141->5142 5143 402bbf 18 API calls 5142->5143 5144 4021f9 5143->5144 5145 402bbf 18 API calls 5144->5145 5146 402202 5145->5146 5147 406362 2 API calls 5146->5147 5148 40220b 5147->5148 5149 40221c lstrlenW lstrlenW 5148->5149 5154 40220f 5148->5154 5150 40517e 25 API calls 5149->5150 5153 40225a SHFileOperationW 5150->5153 5151 40517e 25 API calls 5152 402217 5151->5152 5153->5152 5153->5154 5154->5151 5154->5152 5155 40156b 5156 401584 5155->5156 5157 40157b ShowWindow 5155->5157 5158 401592 ShowWindow 5156->5158 5159 402a4c 5156->5159 5157->5156 5158->5159 5167 40226e 5168 402288 5167->5168 5169 402275 5167->5169 5170 406041 18 API calls 5169->5170 5171 402282 5170->5171 5172 405764 MessageBoxIndirectW 5171->5172 5172->5168 5173 4014f1 SetForegroundWindow 5174 402a4c 5173->5174 5175 4050f2 5176 405102 5175->5176 5177 405116 5175->5177 5178 40515f 5176->5178 5179 405108 5176->5179 5180 40511e IsWindowVisible 5177->5180 5186 405135 5177->5186 5181 405164 CallWindowProcW 5178->5181 5182 40412f SendMessageW 5179->5182 5180->5178 5183 40512b 5180->5183 5185 405112 5181->5185 5182->5185 5188 404a48 SendMessageW 5183->5188 5186->5181 5193 404ac8 5186->5193 5189 404aa7 SendMessageW 5188->5189 5190 404a6b GetMessagePos ScreenToClient SendMessageW 5188->5190 5192 404a9f 5189->5192 5191 404aa4 5190->5191 5190->5192 5191->5189 5192->5186 5202 40601f lstrcpynW 5193->5202 5195 404adb 5203 405f66 wsprintfW 5195->5203 5197 404ae5 5198 40140b 2 API calls 5197->5198 5199 404aee 5198->5199 5204 40601f lstrcpynW 5199->5204 5201 404af5 5201->5178 5202->5195 5203->5197 5204->5201 5205 401673 5206 402bbf 18 API calls 5205->5206 5207 40167a 5206->5207 5208 402bbf 18 API calls 5207->5208 5209 401683 5208->5209 5210 402bbf 18 API calls 5209->5210 5211 40168c MoveFileW 5210->5211 5212 40169f 5211->5212 5218 401698 5211->5218 5213 406362 2 API calls 5212->5213 5216 4021e1 5212->5216 5215 4016ae 5213->5215 5214 401423 25 API calls 5214->5216 5215->5216 5217 405ec0 38 API calls 5215->5217 5217->5218 5218->5214 5219 100016b6 5220 100016e5 5219->5220 5221 10001b18 22 API calls 5220->5221 5222 100016ec 5221->5222 5223 100016f3 5222->5223 5224 100016ff 5222->5224 5225 10001272 2 API calls 5223->5225 5226 10001726 5224->5226 5227 10001709 5224->5227 5228 100016fd 5225->5228 5230 10001750 5226->5230 5231 1000172c 5226->5231 5229 1000153d 3 API calls 5227->5229 5233 1000170e 5229->5233 5232 1000153d 3 API calls 5230->5232 5234 100015b4 3 API calls 5231->5234 5232->5228 5235 100015b4 3 API calls 5233->5235 5236 10001731 5234->5236 5237 10001714 5235->5237 5238 10001272 2 API calls 5236->5238 5240 10001272 2 API calls 5237->5240 5239 10001737 GlobalFree 5238->5239 5239->5228 5241 1000174b GlobalFree 5239->5241 5242 1000171a GlobalFree 5240->5242 5241->5228 5242->5228 5243 4041f7 lstrcpynW lstrlenW 5244 10002238 5245 10002296 5244->5245 5246 100022cc 5244->5246 5245->5246 5247 100022a8 GlobalAlloc 5245->5247 5247->5245 5248 404afa GetDlgItem GetDlgItem 5249 404b4c 7 API calls 5248->5249 5255 404d65 5248->5255 5250 404be2 SendMessageW 5249->5250 5251 404bef DeleteObject 5249->5251 5250->5251 5252 404bf8 5251->5252 5253 404c2f 5252->5253 5254 406041 18 API calls 5252->5254 5299 4040e3 5253->5299 5259 404c11 SendMessageW SendMessageW 5254->5259 5258 404e49 5255->5258 5265 404a48 5 API calls 5255->5265 5281 404dd6 5255->5281 5257 404ef5 5260 404f07 5257->5260 5261 404eff SendMessageW 5257->5261 5258->5257 5267 404ea2 SendMessageW 5258->5267 5291 404d58 5258->5291 5259->5252 5269 404f20 5260->5269 5270 404f19 ImageList_Destroy 5260->5270 5278 404f30 5260->5278 5261->5260 5262 404c43 5266 4040e3 19 API calls 5262->5266 5264 404e3b SendMessageW 5264->5258 5265->5281 5282 404c51 5266->5282 5272 404eb7 SendMessageW 5267->5272 5267->5291 5273 404f29 GlobalFree 5269->5273 5269->5278 5270->5269 5271 40509f 5276 4050b1 ShowWindow GetDlgItem ShowWindow 5271->5276 5271->5291 5275 404eca 5272->5275 5273->5278 5274 404d26 GetWindowLongW SetWindowLongW 5277 404d3f 5274->5277 5283 404edb SendMessageW 5275->5283 5276->5291 5279 404d45 ShowWindow 5277->5279 5280 404d5d 5277->5280 5278->5271 5290 404ac8 4 API calls 5278->5290 5295 404f6b 5278->5295 5302 404118 SendMessageW 5279->5302 5303 404118 SendMessageW 5280->5303 5281->5258 5281->5264 5282->5274 5284 404d20 5282->5284 5287 404ca1 SendMessageW 5282->5287 5288 404cdd SendMessageW 5282->5288 5289 404cee SendMessageW 5282->5289 5283->5257 5284->5274 5284->5277 5287->5282 5288->5282 5289->5282 5290->5295 5307 40414a 5291->5307 5292 405075 InvalidateRect 5292->5271 5293 40508b 5292->5293 5304 404a03 5293->5304 5294 404f99 SendMessageW 5298 404faf 5294->5298 5295->5294 5295->5298 5297 405023 SendMessageW SendMessageW 5297->5298 5298->5292 5298->5297 5300 406041 18 API calls 5299->5300 5301 4040ee SetDlgItemTextW 5300->5301 5301->5262 5302->5291 5303->5255 5321 40493a 5304->5321 5306 404a18 5306->5271 5308 404162 GetWindowLongW 5307->5308 5318 4041eb 5307->5318 5309 404173 5308->5309 5308->5318 5310 404182 GetSysColor 5309->5310 5311 404185 5309->5311 5310->5311 5312 404195 SetBkMode 5311->5312 5313 40418b SetTextColor 5311->5313 5314 4041b3 5312->5314 5315 4041ad GetSysColor 5312->5315 5313->5312 5316 4041c4 5314->5316 5317 4041ba SetBkColor 5314->5317 5315->5314 5316->5318 5319 4041d7 DeleteObject 5316->5319 5320 4041de CreateBrushIndirect 5316->5320 5317->5316 5319->5320 5320->5318 5322 404953 5321->5322 5323 406041 18 API calls 5322->5323 5324 4049b7 5323->5324 5325 406041 18 API calls 5324->5325 5326 4049c2 5325->5326 5327 406041 18 API calls 5326->5327 5328 4049d8 lstrlenW wsprintfW SetDlgItemTextW 5327->5328 5328->5306 5329 401cfa GetDlgItem GetClientRect 5330 402bbf 18 API calls 5329->5330 5331 401d2c LoadImageW SendMessageW 5330->5331 5332 401d4a DeleteObject 5331->5332 5333 402a4c 5331->5333 5332->5333 4858 40237b 4859 402381 4858->4859 4860 402bbf 18 API calls 4859->4860 4861 402393 4860->4861 4862 402bbf 18 API calls 4861->4862 4863 40239d RegCreateKeyExW 4862->4863 4864 4023c7 4863->4864 4866 40281e 4863->4866 4865 4023e2 4864->4865 4867 402bbf 18 API calls 4864->4867 4868 4023ee 4865->4868 4870 402ba2 18 API calls 4865->4870 4869 4023d8 lstrlenW 4867->4869 4871 402409 RegSetValueExW 4868->4871 4872 403027 36 API calls 4868->4872 4869->4865 4870->4868 4873 40241f RegCloseKey 4871->4873 4872->4871 4873->4866 5334 4027fb 5335 402bbf 18 API calls 5334->5335 5336 402802 FindFirstFileW 5335->5336 5337 40282a 5336->5337 5340 402815 5336->5340 5338 402833 5337->5338 5342 405f66 wsprintfW 5337->5342 5343 40601f lstrcpynW 5338->5343 5342->5338 5343->5340 5344 1000103d 5345 1000101b 5 API calls 5344->5345 5346 10001056 5345->5346 5347 40457e 5348 4045aa 5347->5348 5349 4045bb 5347->5349 5408 405748 GetDlgItemTextW 5348->5408 5350 4045c7 GetDlgItem 5349->5350 5357 404626 5349->5357 5353 4045db 5350->5353 5352 4045b5 5355 4062b3 5 API calls 5352->5355 5356 4045ef SetWindowTextW 5353->5356 5360 405a7e 4 API calls 5353->5360 5354 40470a 5406 4048b9 5354->5406 5410 405748 GetDlgItemTextW 5354->5410 5355->5349 5361 4040e3 19 API calls 5356->5361 5357->5354 5362 406041 18 API calls 5357->5362 5357->5406 5359 40414a 8 API calls 5364 4048cd 5359->5364 5365 4045e5 5360->5365 5366 40460b 5361->5366 5367 40469a SHBrowseForFolderW 5362->5367 5363 40473a 5368 405adb 18 API calls 5363->5368 5365->5356 5372 4059d3 3 API calls 5365->5372 5369 4040e3 19 API calls 5366->5369 5367->5354 5370 4046b2 CoTaskMemFree 5367->5370 5371 404740 5368->5371 5373 404619 5369->5373 5374 4059d3 3 API calls 5370->5374 5411 40601f lstrcpynW 5371->5411 5372->5356 5409 404118 SendMessageW 5373->5409 5376 4046bf 5374->5376 5379 4046f6 SetDlgItemTextW 5376->5379 5383 406041 18 API calls 5376->5383 5378 40461f 5381 4063f5 5 API calls 5378->5381 5379->5354 5380 404757 5382 4063f5 5 API calls 5380->5382 5381->5357 5390 40475e 5382->5390 5384 4046de lstrcmpiW 5383->5384 5384->5379 5386 4046ef lstrcatW 5384->5386 5385 40479f 5412 40601f lstrcpynW 5385->5412 5386->5379 5388 4047a6 5389 405a7e 4 API calls 5388->5389 5391 4047ac GetDiskFreeSpaceW 5389->5391 5390->5385 5394 405a1f 2 API calls 5390->5394 5395 4047f7 5390->5395 5393 4047d0 MulDiv 5391->5393 5391->5395 5393->5395 5394->5390 5396 404a03 21 API calls 5395->5396 5397 404868 5395->5397 5399 404855 5396->5399 5398 40488b 5397->5398 5400 40140b 2 API calls 5397->5400 5413 404105 EnableWindow 5398->5413 5401 40486a SetDlgItemTextW 5399->5401 5402 40485a 5399->5402 5400->5398 5401->5397 5404 40493a 21 API calls 5402->5404 5404->5397 5405 4048a7 5405->5406 5414 404513 5405->5414 5406->5359 5408->5352 5409->5378 5410->5363 5411->5380 5412->5388 5413->5405 5415 404521 5414->5415 5416 404526 SendMessageW 5414->5416 5415->5416 5416->5406 5417 4014ff 5418 401507 5417->5418 5419 40151a 5417->5419 5420 402ba2 18 API calls 5418->5420 5420->5419 5421 401000 5422 401037 BeginPaint GetClientRect 5421->5422 5423 40100c DefWindowProcW 5421->5423 5425 4010f3 5422->5425 5426 401179 5423->5426 5427 401073 CreateBrushIndirect FillRect DeleteObject 5425->5427 5428 4010fc 5425->5428 5427->5425 5429 401102 CreateFontIndirectW 5428->5429 5430 401167 EndPaint 5428->5430 5429->5430 5431 401112 6 API calls 5429->5431 5430->5426 5431->5430 5432 404280 5433 404298 5432->5433 5437 4043b2 5432->5437 5438 4040e3 19 API calls 5433->5438 5434 40441c 5435 4044ee 5434->5435 5436 404426 GetDlgItem 5434->5436 5443 40414a 8 API calls 5435->5443 5439 404440 5436->5439 5440 4044af 5436->5440 5437->5434 5437->5435 5441 4043ed GetDlgItem SendMessageW 5437->5441 5442 4042ff 5438->5442 5439->5440 5448 404466 6 API calls 5439->5448 5440->5435 5444 4044c1 5440->5444 5463 404105 EnableWindow 5441->5463 5446 4040e3 19 API calls 5442->5446 5447 4044e9 5443->5447 5449 4044d7 5444->5449 5450 4044c7 SendMessageW 5444->5450 5452 40430c CheckDlgButton 5446->5452 5448->5440 5449->5447 5453 4044dd SendMessageW 5449->5453 5450->5449 5451 404417 5454 404513 SendMessageW 5451->5454 5461 404105 EnableWindow 5452->5461 5453->5447 5454->5434 5456 40432a GetDlgItem 5462 404118 SendMessageW 5456->5462 5458 404340 SendMessageW 5459 404366 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5458->5459 5460 40435d GetSysColor 5458->5460 5459->5447 5460->5459 5461->5456 5462->5458 5463->5451 5471 401904 5472 40193b 5471->5472 5473 402bbf 18 API calls 5472->5473 5474 401940 5473->5474 5475 405810 69 API calls 5474->5475 5476 401949 5475->5476 5477 402d04 5478 402d16 SetTimer 5477->5478 5479 402d2f 5477->5479 5478->5479 5480 402d84 5479->5480 5481 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5479->5481 5481->5480 4305 402786 4306 40278d 4305->4306 4308 4029f7 4305->4308 4307 402ba2 18 API calls 4306->4307 4309 402798 4307->4309 4310 40279f SetFilePointer 4309->4310 4310->4308 4311 4027af 4310->4311 4313 405f66 wsprintfW 4311->4313 4313->4308 4402 100027c7 4403 10002817 4402->4403 4404 100027d7 VirtualProtect 4402->4404 4404->4403 5482 401907 5483 402bbf 18 API calls 5482->5483 5484 40190e 5483->5484 5485 405764 MessageBoxIndirectW 5484->5485 5486 401917 5485->5486 5487 401e08 5488 402bbf 18 API calls 5487->5488 5489 401e0e 5488->5489 5490 402bbf 18 API calls 5489->5490 5491 401e17 5490->5491 5492 402bbf 18 API calls 5491->5492 5493 401e20 5492->5493 5494 402bbf 18 API calls 5493->5494 5495 401e29 5494->5495 5496 401423 25 API calls 5495->5496 5497 401e30 ShellExecuteW 5496->5497 5498 401e61 5497->5498 4405 401389 4407 401390 4405->4407 4406 4013fe 4407->4406 4408 4013cb MulDiv SendMessageW 4407->4408 4408->4407 5504 403c0b 5505 403c23 5504->5505 5506 403d5e 5504->5506 5505->5506 5507 403c2f 5505->5507 5508 403daf 5506->5508 5509 403d6f GetDlgItem GetDlgItem 5506->5509 5510 403c3a SetWindowPos 5507->5510 5511 403c4d 5507->5511 5513 403e09 5508->5513 5521 401389 2 API calls 5508->5521 5512 4040e3 19 API calls 5509->5512 5510->5511 5515 403c52 ShowWindow 5511->5515 5516 403c6a 5511->5516 5517 403d99 SetClassLongW 5512->5517 5514 40412f SendMessageW 5513->5514 5534 403d59 5513->5534 5531 403e1b 5514->5531 5515->5516 5518 403c72 DestroyWindow 5516->5518 5519 403c8c 5516->5519 5520 40140b 2 API calls 5517->5520 5571 40406c 5518->5571 5522 403c91 SetWindowLongW 5519->5522 5523 403ca2 5519->5523 5520->5508 5524 403de1 5521->5524 5522->5534 5527 403cae GetDlgItem 5523->5527 5542 403d19 5523->5542 5524->5513 5528 403de5 SendMessageW 5524->5528 5525 40140b 2 API calls 5525->5531 5526 40406e DestroyWindow EndDialog 5526->5571 5532 403cc1 SendMessageW IsWindowEnabled 5527->5532 5533 403cde 5527->5533 5528->5534 5529 40414a 8 API calls 5529->5534 5530 40409d ShowWindow 5530->5534 5531->5525 5531->5526 5531->5534 5535 406041 18 API calls 5531->5535 5545 4040e3 19 API calls 5531->5545 5547 4040e3 19 API calls 5531->5547 5562 403fae DestroyWindow 5531->5562 5532->5533 5532->5534 5536 403ceb 5533->5536 5537 403d32 SendMessageW 5533->5537 5538 403cfe 5533->5538 5546 403ce3 5533->5546 5535->5531 5536->5537 5536->5546 5537->5542 5540 403d06 5538->5540 5541 403d1b 5538->5541 5543 40140b 2 API calls 5540->5543 5544 40140b 2 API calls 5541->5544 5542->5529 5543->5546 5544->5546 5545->5531 5546->5542 5572 4040bc 5546->5572 5548 403e96 GetDlgItem 5547->5548 5549 403eb3 ShowWindow EnableWindow 5548->5549 5550 403eab 5548->5550 5575 404105 EnableWindow 5549->5575 5550->5549 5552 403edd EnableWindow 5555 403ef1 5552->5555 5553 403ef6 GetSystemMenu EnableMenuItem SendMessageW 5554 403f26 SendMessageW 5553->5554 5553->5555 5554->5555 5555->5553 5576 404118 SendMessageW 5555->5576 5577 40601f lstrcpynW 5555->5577 5558 403f54 lstrlenW 5559 406041 18 API calls 5558->5559 5560 403f6a SetWindowTextW 5559->5560 5561 401389 2 API calls 5560->5561 5561->5531 5563 403fc8 CreateDialogParamW 5562->5563 5562->5571 5564 403ffb 5563->5564 5563->5571 5565 4040e3 19 API calls 5564->5565 5566 404006 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5565->5566 5567 401389 2 API calls 5566->5567 5568 40404c 5567->5568 5568->5534 5569 404054 ShowWindow 5568->5569 5570 40412f SendMessageW 5569->5570 5570->5571 5571->5530 5571->5534 5573 4040c3 5572->5573 5574 4040c9 SendMessageW 5572->5574 5573->5574 5574->5542 5575->5552 5576->5555 5577->5558 5578 1000164f 5579 10001516 GlobalFree 5578->5579 5581 10001667 5579->5581 5580 100016ad GlobalFree 5581->5580 5582 10001682 5581->5582 5583 10001699 VirtualFree 5581->5583 5582->5580 5583->5580 5584 401491 5585 40517e 25 API calls 5584->5585 5586 401498 5585->5586 5587 401a15 5588 402bbf 18 API calls 5587->5588 5589 401a1e ExpandEnvironmentStringsW 5588->5589 5590 401a32 5589->5590 5592 401a45 5589->5592 5591 401a37 lstrcmpW 5590->5591 5590->5592 5591->5592 5593 402515 5594 402bbf 18 API calls 5593->5594 5595 40251c 5594->5595 5598 405bf4 GetFileAttributesW CreateFileW 5595->5598 5597 402528 5598->5597 5599 402095 5600 402bbf 18 API calls 5599->5600 5601 40209c 5600->5601 5602 402bbf 18 API calls 5601->5602 5603 4020a6 5602->5603 5604 402bbf 18 API calls 5603->5604 5605 4020b0 5604->5605 5606 402bbf 18 API calls 5605->5606 5607 4020ba 5606->5607 5608 402bbf 18 API calls 5607->5608 5609 4020c4 5608->5609 5610 402103 CoCreateInstance 5609->5610 5611 402bbf 18 API calls 5609->5611 5614 402122 5610->5614 5611->5610 5612 401423 25 API calls 5613 4021e1 5612->5613 5614->5612 5614->5613 5615 401b16 5616 402bbf 18 API calls 5615->5616 5617 401b1d 5616->5617 5618 402ba2 18 API calls 5617->5618 5619 401b26 wsprintfW 5618->5619 5620 402a4c 5619->5620 5621 10001058 5623 10001074 5621->5623 5622 100010dd 5623->5622 5624 10001516 GlobalFree 5623->5624 5625 10001092 5623->5625 5624->5625 5626 10001516 GlobalFree 5625->5626 5627 100010a2 5626->5627 5628 100010b2 5627->5628 5629 100010a9 GlobalSize 5627->5629 5630 100010b6 GlobalAlloc 5628->5630 5631 100010c7 5628->5631 5629->5628 5632 1000153d 3 API calls 5630->5632 5633 100010d2 GlobalFree 5631->5633 5632->5631 5633->5622 4875 40159b 4876 402bbf 18 API calls 4875->4876 4877 4015a2 SetFileAttributesW 4876->4877 4878 4015b4 4877->4878 4879 40229d 4880 4022a5 4879->4880 4882 4022ab 4879->4882 4881 402bbf 18 API calls 4880->4881 4881->4882 4883 402bbf 18 API calls 4882->4883 4884 4022b9 4882->4884 4883->4884 4885 402bbf 18 API calls 4884->4885 4887 4022c7 4884->4887 4885->4887 4886 402bbf 18 API calls 4888 4022d0 WritePrivateProfileStringW 4886->4888 4887->4886 5648 401f1d 5649 402bbf 18 API calls 5648->5649 5650 401f24 5649->5650 5651 4063f5 5 API calls 5650->5651 5652 401f33 5651->5652 5653 401fb7 5652->5653 5654 401f4f GlobalAlloc 5652->5654 5654->5653 5655 401f63 5654->5655 5656 4063f5 5 API calls 5655->5656 5657 401f6a 5656->5657 5658 4063f5 5 API calls 5657->5658 5659 401f74 5658->5659 5659->5653 5663 405f66 wsprintfW 5659->5663 5661 401fa9 5664 405f66 wsprintfW 5661->5664 5663->5661 5664->5653 4889 40249e 4900 402cc9 4889->4900 4891 4024a8 4892 402ba2 18 API calls 4891->4892 4893 4024b1 4892->4893 4894 4024bc 4893->4894 4898 40281e 4893->4898 4895 4024d5 RegEnumValueW 4894->4895 4896 4024c9 RegEnumKeyW 4894->4896 4897 4024ee RegCloseKey 4895->4897 4895->4898 4896->4897 4897->4898 4901 402bbf 18 API calls 4900->4901 4902 402ce2 4901->4902 4903 402cf0 RegOpenKeyExW 4902->4903 4903->4891 5665 40149e 5666 402288 5665->5666 5667 4014ac PostQuitMessage 5665->5667 5667->5666 4904 40231f 4905 402324 4904->4905 4906 40234f 4904->4906 4908 402cc9 19 API calls 4905->4908 4907 402bbf 18 API calls 4906->4907 4909 402356 4907->4909 4910 40232b 4908->4910 4916 402bff RegOpenKeyExW 4909->4916 4911 402335 4910->4911 4915 40236c 4910->4915 4912 402bbf 18 API calls 4911->4912 4913 40233c RegDeleteValueW RegCloseKey 4912->4913 4913->4915 4917 402c93 4916->4917 4920 402c2a 4916->4920 4917->4915 4918 402c50 RegEnumKeyW 4919 402c62 RegCloseKey 4918->4919 4918->4920 4922 4063f5 5 API calls 4919->4922 4920->4918 4920->4919 4921 402c87 RegCloseKey 4920->4921 4923 402bff 5 API calls 4920->4923 4925 402c76 4921->4925 4924 402c72 4922->4924 4923->4920 4924->4925 4926 402ca2 RegDeleteKeyW 4924->4926 4925->4917 4926->4925 5675 100010e1 5676 10001111 5675->5676 5677 100011d8 GlobalFree 5676->5677 5678 100012ba 2 API calls 5676->5678 5679 100011d3 5676->5679 5680 10001272 2 API calls 5676->5680 5681 10001164 GlobalAlloc 5676->5681 5682 100011f8 GlobalFree 5676->5682 5683 100011c4 GlobalFree 5676->5683 5684 100012e1 lstrcpyW 5676->5684 5678->5676 5679->5677 5680->5683 5681->5676 5682->5676 5683->5676 5684->5676 5685 401ca3 5686 402ba2 18 API calls 5685->5686 5687 401ca9 IsWindow 5686->5687 5688 401a05 5687->5688 5689 403826 5690 403831 5689->5690 5691 403838 GlobalAlloc 5690->5691 5692 403835 5690->5692 5691->5692 5693 402a27 SendMessageW 5694 402a41 InvalidateRect 5693->5694 5695 402a4c 5693->5695 5694->5695 5696 40242a 5697 402cc9 19 API calls 5696->5697 5698 402434 5697->5698 5699 402bbf 18 API calls 5698->5699 5700 40243d 5699->5700 5701 402448 RegQueryValueExW 5700->5701 5704 40281e 5700->5704 5702 40246e RegCloseKey 5701->5702 5703 402468 5701->5703 5702->5704 5703->5702 5707 405f66 wsprintfW 5703->5707 5707->5702 4794 40172d 4795 402bbf 18 API calls 4794->4795 4796 401734 SearchPathW 4795->4796 4797 40174f 4796->4797 5715 404231 lstrlenW 5716 404250 5715->5716 5717 404252 WideCharToMultiByte 5715->5717 5716->5717 5718 4027b4 5719 4027ba 5718->5719 5720 4027c2 FindClose 5719->5720 5721 402a4c 5719->5721 5720->5721 4804 401b37 4805 401b44 4804->4805 4806 401b88 4804->4806 4807 401bcd 4805->4807 4812 401b5b 4805->4812 4808 401bb2 GlobalAlloc 4806->4808 4809 401b8d 4806->4809 4811 406041 18 API calls 4807->4811 4815 402288 4807->4815 4810 406041 18 API calls 4808->4810 4809->4815 4825 40601f lstrcpynW 4809->4825 4810->4807 4814 402282 4811->4814 4823 40601f lstrcpynW 4812->4823 4818 405764 MessageBoxIndirectW 4814->4818 4817 401b9f GlobalFree 4817->4815 4818->4815 4819 401b6a 4824 40601f lstrcpynW 4819->4824 4821 401b79 4826 40601f lstrcpynW 4821->4826 4823->4819 4824->4821 4825->4817 4826->4815 5722 404537 5723 404547 5722->5723 5724 40456d 5722->5724 5725 4040e3 19 API calls 5723->5725 5726 40414a 8 API calls 5724->5726 5727 404554 SetDlgItemTextW 5725->5727 5728 404579 5726->5728 5727->5724 5729 402537 5730 402562 5729->5730 5731 40254b 5729->5731 5733 402596 5730->5733 5734 402567 5730->5734 5732 402ba2 18 API calls 5731->5732 5742 402552 5732->5742 5736 402bbf 18 API calls 5733->5736 5735 402bbf 18 API calls 5734->5735 5737 40256e WideCharToMultiByte lstrlenA 5735->5737 5738 40259d lstrlenW 5736->5738 5737->5742 5738->5742 5739 4025e0 5740 4025ca 5740->5739 5741 405ca6 WriteFile 5740->5741 5741->5739 5742->5739 5742->5740 5743 405cd5 5 API calls 5742->5743 5743->5740 5744 4014b8 5745 4014be 5744->5745 5746 401389 2 API calls 5745->5746 5747 4014c6 5746->5747 4838 4015b9 4839 402bbf 18 API calls 4838->4839 4840 4015c0 4839->4840 4841 405a7e 4 API calls 4840->4841 4853 4015c9 4841->4853 4842 401629 4843 40162e 4842->4843 4846 40165b 4842->4846 4845 401423 25 API calls 4843->4845 4844 405a00 CharNextW 4844->4853 4847 401635 4845->4847 4848 401423 25 API calls 4846->4848 4857 40601f lstrcpynW 4847->4857 4854 401653 4848->4854 4850 4056ca 2 API calls 4850->4853 4851 4056e7 5 API calls 4851->4853 4852 401642 SetCurrentDirectoryW 4852->4854 4853->4842 4853->4844 4853->4850 4853->4851 4855 40160f GetFileAttributesW 4853->4855 4856 40564d 4 API calls 4853->4856 4855->4853 4856->4853 4857->4852 5748 40293b 5749 402ba2 18 API calls 5748->5749 5750 402941 5749->5750 5751 402964 5750->5751 5752 40297d 5750->5752 5761 40281e 5750->5761 5755 402969 5751->5755 5756 40297a 5751->5756 5753 402993 5752->5753 5754 402987 5752->5754 5758 406041 18 API calls 5753->5758 5757 402ba2 18 API calls 5754->5757 5762 40601f lstrcpynW 5755->5762 5763 405f66 wsprintfW 5756->5763 5757->5761 5758->5761 5762->5761 5763->5761 5764 4052bd 5765 405467 5764->5765 5766 4052de GetDlgItem GetDlgItem GetDlgItem 5764->5766 5767 405470 GetDlgItem CreateThread CloseHandle 5765->5767 5769 405498 5765->5769 5809 404118 SendMessageW 5766->5809 5767->5769 5771 4054e8 5769->5771 5772 4054af ShowWindow ShowWindow 5769->5772 5774 4054c3 5769->5774 5770 40534e 5775 405355 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5770->5775 5779 40414a 8 API calls 5771->5779 5811 404118 SendMessageW 5772->5811 5773 405523 5773->5771 5782 405531 SendMessageW 5773->5782 5774->5773 5777 4054d7 5774->5777 5778 4054fd ShowWindow 5774->5778 5780 4053c3 5775->5780 5781 4053a7 SendMessageW SendMessageW 5775->5781 5783 4040bc SendMessageW 5777->5783 5785 40551d 5778->5785 5786 40550f 5778->5786 5784 4054f6 5779->5784 5788 4053d6 5780->5788 5789 4053c8 SendMessageW 5780->5789 5781->5780 5782->5784 5790 40554a CreatePopupMenu 5782->5790 5783->5771 5787 4040bc SendMessageW 5785->5787 5791 40517e 25 API calls 5786->5791 5787->5773 5793 4040e3 19 API calls 5788->5793 5789->5788 5792 406041 18 API calls 5790->5792 5791->5785 5794 40555a AppendMenuW 5792->5794 5795 4053e6 5793->5795 5796 405577 GetWindowRect 5794->5796 5797 40558a TrackPopupMenu 5794->5797 5798 405423 GetDlgItem SendMessageW 5795->5798 5799 4053ef ShowWindow 5795->5799 5796->5797 5797->5784 5800 4055a5 5797->5800 5798->5784 5803 40544a SendMessageW SendMessageW 5798->5803 5801 405412 5799->5801 5802 405405 ShowWindow 5799->5802 5804 4055c1 SendMessageW 5800->5804 5810 404118 SendMessageW 5801->5810 5802->5801 5803->5784 5804->5804 5805 4055de OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5804->5805 5807 405603 SendMessageW 5805->5807 5807->5807 5808 40562c GlobalUnlock SetClipboardData CloseClipboard 5807->5808 5808->5784 5809->5770 5810->5798 5811->5774 5812 10002a7f 5813 10002a97 5812->5813 5814 1000158f 2 API calls 5813->5814 5815 10002ab2 5814->5815

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40326a-40329c SetErrorMode GetVersion 1 40329e-4032a6 call 4063f5 0->1 2 4032af-403342 call 406389 * 3 call 4063f5 * 2 #17 OleInitialize SHGetFileInfoW call 40601f GetCommandLineW call 40601f GetModuleHandleW 0->2 1->2 7 4032a8 1->7 20 403344-40334b 2->20 21 40334c-403366 call 405a00 CharNextW 2->21 7->2 20->21 24 40336c-403372 21->24 25 40347e-403498 GetTempPathW call 403239 21->25 27 403374-403379 24->27 28 40337b-403381 24->28 32 4034f0-40350a DeleteFileW call 402dee 25->32 33 40349a-4034b8 GetWindowsDirectoryW lstrcatW call 403239 25->33 27->27 27->28 30 403383-403387 28->30 31 403388-40338c 28->31 30->31 34 403392-403398 31->34 35 40344a-403457 call 405a00 31->35 53 403510-403516 32->53 54 4035bb-4035cc call 40378e OleUninitialize 32->54 33->32 50 4034ba-4034ea GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403239 33->50 39 4033b2-4033eb 34->39 40 40339a-4033a1 34->40 51 403459-40345a 35->51 52 40345b-403461 35->52 43 403408-403442 39->43 44 4033ed-4033f2 39->44 41 4033a3-4033a6 40->41 42 4033a8 40->42 41->39 41->42 42->39 43->35 49 403444-403448 43->49 44->43 48 4033f4-4033fc 44->48 56 403403 48->56 57 4033fe-403401 48->57 49->35 58 403469-403477 call 40601f 49->58 50->32 50->54 51->52 52->24 60 403467 52->60 61 4035ab-4035b2 call 403868 53->61 62 40351c-403527 call 405a00 53->62 71 4036f2-4036f8 54->71 72 4035d2-4035e2 call 405764 ExitProcess 54->72 56->43 57->43 57->56 68 40347c 58->68 60->68 70 4035b7 61->70 73 403575-40357f 62->73 74 403529-40355e 62->74 68->25 70->54 76 403776-40377e 71->76 77 4036fa-403710 GetCurrentProcess OpenProcessToken 71->77 81 403581-40358f call 405adb 73->81 82 4035e8-4035fc call 4056e7 lstrcatW 73->82 78 403560-403564 74->78 79 403780 76->79 80 403784-403788 ExitProcess 76->80 84 403712-403740 LookupPrivilegeValueW AdjustTokenPrivileges 77->84 85 403746-403754 call 4063f5 77->85 86 403566-40356b 78->86 87 40356d-403571 78->87 79->80 81->54 97 403591-4035a7 call 40601f * 2 81->97 98 403609-403623 lstrcatW lstrcmpiW 82->98 99 4035fe-403604 lstrcatW 82->99 84->85 95 403762-40376d ExitWindowsEx 85->95 96 403756-403760 85->96 86->87 91 403573 86->91 87->78 87->91 91->73 95->76 100 40376f-403771 call 40140b 95->100 96->95 96->100 97->61 98->54 102 403625-403628 98->102 99->98 100->76 106 403631 call 4056ca 102->106 107 40362a-40362f call 40564d 102->107 112 403636-403644 SetCurrentDirectoryW 106->112 107->112 114 403651-40367a call 40601f 112->114 115 403646-40364c call 40601f 112->115 119 40367f-40369b call 406041 DeleteFileW 114->119 115->114 122 4036dc-4036e4 119->122 123 40369d-4036ad CopyFileW 119->123 122->119 124 4036e6-4036ed call 405ec0 122->124 123->122 125 4036af-4036cf call 405ec0 call 406041 call 4056ff 123->125 124->54 125->122 134 4036d1-4036d8 CloseHandle 125->134 134->122
                          APIs
                          • SetErrorMode.KERNELBASE ref: 0040328C
                          • GetVersion.KERNEL32 ref: 00403292
                          • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 004032E2
                          • OleInitialize.OLE32(00000000), ref: 004032E9
                          • SHGetFileInfoW.SHELL32(004206C8,00000000,?,000002B4,00000000), ref: 00403305
                          • GetCommandLineW.KERNEL32(00428220,NSIS Error), ref: 0040331A
                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\O0rhQM49FL.exe",00000000), ref: 0040332D
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\O0rhQM49FL.exe",00000020), ref: 00403354
                            • Part of subcall function 004063F5: GetModuleHandleA.KERNEL32(?,?,00000020,004032D6,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00406407
                            • Part of subcall function 004063F5: GetProcAddress.KERNEL32(00000000,?), ref: 00406422
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040348F
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034A0
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034AC
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034C0
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034C8
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034D9
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034E1
                          • DeleteFileW.KERNELBASE(1033), ref: 004034F5
                            • Part of subcall function 0040601F: lstrcpynW.KERNEL32(00409300,00409300,00000400,0040331A,00428220,NSIS Error), ref: 0040602C
                          • OleUninitialize.OLE32(?), ref: 004035C0
                          • ExitProcess.KERNEL32 ref: 004035E2
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\O0rhQM49FL.exe",00000000,?), ref: 004035F5
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040926C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\O0rhQM49FL.exe",00000000,?), ref: 00403604
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\O0rhQM49FL.exe",00000000,?), ref: 0040360F
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\O0rhQM49FL.exe",00000000,?), ref: 0040361B
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403637
                          • DeleteFileW.KERNEL32(0041FEC8,0041FEC8,?,0042A000,?), ref: 00403691
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\O0rhQM49FL.exe,0041FEC8,00000001), ref: 004036A5
                          • CloseHandle.KERNEL32(00000000,0041FEC8,0041FEC8,?,0041FEC8,00000000), ref: 004036D2
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403701
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403708
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040371D
                          • AdjustTokenPrivileges.ADVAPI32 ref: 00403740
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403765
                          • ExitProcess.KERNEL32 ref: 00403788
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                          • String ID: "C:\Users\user\Desktop\O0rhQM49FL.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\unnauseating\albuestdet$C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes$C:\Users\user\Desktop$C:\Users\user\Desktop\O0rhQM49FL.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                          • API String ID: 3586999533-3904103861
                          • Opcode ID: fda6c057a4537dba88034d229a92b30a1776572ee97949e398e0e99b98fea1a3
                          • Instruction ID: 47b2dd04bf5340fec55df09ad24e258ddf9dfe897e1895205e314fce2ef220c4
                          • Opcode Fuzzy Hash: fda6c057a4537dba88034d229a92b30a1776572ee97949e398e0e99b98fea1a3
                          • Instruction Fuzzy Hash: 08D12770604200BAD720BF659D49A3B3AACEB4170AF50487FF441B61D2DB7D9941CB6E
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                          • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                          • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                          • GlobalFree.KERNEL32(00000000), ref: 10001C89
                          • GlobalFree.KERNEL32(?), ref: 10001D83
                          • GlobalFree.KERNEL32(?), ref: 10001D88
                          • GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001F38
                          • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc
                          • String ID:
                          • API String ID: 4227406936-0
                          • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                          • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                          • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                          • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 476 406041-40604c 477 40604e-40605d 476->477 478 40605f-406075 476->478 477->478 479 40607b-406088 478->479 480 40628d-406293 478->480 479->480 483 40608e-406095 479->483 481 406299-4062a4 480->481 482 40609a-4060a7 480->482 484 4062a6-4062aa call 40601f 481->484 485 4062af-4062b0 481->485 482->481 486 4060ad-4060b9 482->486 483->480 484->485 488 40627a 486->488 489 4060bf-4060fb 486->489 490 406288-40628b 488->490 491 40627c-406286 488->491 492 406101-40610c GetVersion 489->492 493 40621b-40621f 489->493 490->480 491->480 496 406126 492->496 497 40610e-406112 492->497 494 406221-406225 493->494 495 406254-406258 493->495 499 406235-406242 call 40601f 494->499 500 406227-406233 call 405f66 494->500 502 406267-406278 lstrlenW 495->502 503 40625a-406262 call 406041 495->503 501 40612d-406134 496->501 497->496 498 406114-406118 497->498 498->496 504 40611a-40611e 498->504 514 406247-406250 499->514 500->514 506 406136-406138 501->506 507 406139-40613b 501->507 502->480 503->502 504->496 510 406120-406124 504->510 506->507 512 406177-40617a 507->512 513 40613d-40615a call 405eec 507->513 510->501 517 40618a-40618d 512->517 518 40617c-406188 GetSystemDirectoryW 512->518 521 40615f-406163 513->521 514->502 516 406252 514->516 522 406213-406219 call 4062b3 516->522 519 4061f8-4061fa 517->519 520 40618f-40619d GetWindowsDirectoryW 517->520 523 4061fc-406200 518->523 519->523 524 40619f-4061a9 519->524 520->519 525 406202-406206 521->525 526 406169-406172 call 406041 521->526 522->502 523->522 523->525 528 4061c3-4061d9 SHGetSpecialFolderLocation 524->528 529 4061ab-4061ae 524->529 525->522 531 406208-40620e lstrcatW 525->531 526->523 534 4061f4 528->534 535 4061db-4061f2 SHGetPathFromIDListW CoTaskMemFree 528->535 529->528 533 4061b0-4061b7 529->533 531->522 537 4061bf-4061c1 533->537 534->519 535->523 535->534 537->523 537->528
                          APIs
                          • GetVersion.KERNEL32(00000000,004216E8,?,004051B5,004216E8,00000000,00000000,0040FEC0), ref: 00406104
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406182
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406195
                          • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061D1
                          • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004061DF
                          • CoTaskMemFree.OLE32(?), ref: 004061EA
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040620E
                          • lstrlenW.KERNEL32(Call,00000000,004216E8,?,004051B5,004216E8,00000000,00000000,0040FEC0), ref: 00406268
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 900638850-1230650788
                          • Opcode ID: 2cf121e3e7616b5f5fc1bd3774cadb37834e6b4aa39da4076735cc4ba433a86e
                          • Instruction ID: fd30239bcabdd6b9b5dacf38e9278243e7343c89492a0aeb8152419411716c6f
                          • Opcode Fuzzy Hash: 2cf121e3e7616b5f5fc1bd3774cadb37834e6b4aa39da4076735cc4ba433a86e
                          • Instruction Fuzzy Hash: 70614771A00101ABDF209F64CC40AAE37A5AF51314F12817FE916BA2D1D73D89A2CB5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 538 405810-405836 call 405adb 541 405838-40584a DeleteFileW 538->541 542 40584f-405856 538->542 543 4059cc-4059d0 541->543 544 405858-40585a 542->544 545 405869-405879 call 40601f 542->545 547 405860-405863 544->547 548 40597a-40597f 544->548 551 405888-405889 call 405a1f 545->551 552 40587b-405886 lstrcatW 545->552 547->545 547->548 548->543 550 405981-405984 548->550 553 405986-40598c 550->553 554 40598e-405996 call 406362 550->554 555 40588e-405892 551->555 552->555 553->543 554->543 562 405998-4059ac call 4059d3 call 4057c8 554->562 558 405894-40589c 555->558 559 40589e-4058a4 lstrcatW 555->559 558->559 561 4058a9-4058c5 lstrlenW FindFirstFileW 558->561 559->561 563 4058cb-4058d3 561->563 564 40596f-405973 561->564 580 4059c4-4059c7 call 40517e 562->580 581 4059ae-4059b1 562->581 567 4058f3-405907 call 40601f 563->567 568 4058d5-4058dd 563->568 564->548 566 405975 564->566 566->548 578 405909-405911 567->578 579 40591e-405929 call 4057c8 567->579 570 405952-405962 FindNextFileW 568->570 571 4058df-4058e7 568->571 570->563 574 405968-405969 FindClose 570->574 571->567 575 4058e9-4058f1 571->575 574->564 575->567 575->570 578->570 583 405913-40591c call 405810 578->583 591 40594a-40594d call 40517e 579->591 592 40592b-40592e 579->592 580->543 581->553 582 4059b3-4059c2 call 40517e call 405ec0 581->582 582->543 583->570 591->570 594 405930-405940 call 40517e call 405ec0 592->594 595 405942-405948 592->595 594->570 595->570
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 00405839
                          • lstrcatW.KERNEL32(00424710,\*.*,00424710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 00405881
                          • lstrcatW.KERNEL32(?,00409014,?,00424710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 004058A4
                          • lstrlenW.KERNEL32(?,?,00409014,?,00424710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 004058AA
                          • FindFirstFileW.KERNEL32(00424710,?,?,?,00409014,?,00424710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 004058BA
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,00409300,0000002E), ref: 0040595A
                          • FindClose.KERNEL32(00000000), ref: 00405969
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 0040581D
                          • "C:\Users\user\Desktop\O0rhQM49FL.exe", xrefs: 00405819
                          • \*.*, xrefs: 0040587B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\O0rhQM49FL.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-3165544601
                          • Opcode ID: 444c957dec2a676252e87809a4c54072b8c76e9a6927f2055d166312a46e5fa8
                          • Instruction ID: d8405d9d0b65c0b5bb91e26b2d86fa163654aae1973f92c1c3fedea70a861e09
                          • Opcode Fuzzy Hash: 444c957dec2a676252e87809a4c54072b8c76e9a6927f2055d166312a46e5fa8
                          • Instruction Fuzzy Hash: EA41F271800A18FACB21BB658C49BBF7A78EB81365F10817BF805711D1C77C4D919EAE
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4d5afdfc0dd836d6b0ea96e9b1d1cc0e1a6a0a23e9a334f3c2dfe03cdace4acf
                          • Instruction ID: 25739d06ab219284b51534763859987154442e2999ed31f69dfe775b8bf1d6bb
                          • Opcode Fuzzy Hash: 4d5afdfc0dd836d6b0ea96e9b1d1cc0e1a6a0a23e9a334f3c2dfe03cdace4acf
                          • Instruction Fuzzy Hash: 09F17671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                          APIs
                          • FindFirstFileW.KERNELBASE(75923420,00425758,00424F10,00405B24,00424F10,00424F10,00000000,00424F10,00424F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405830,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 0040636D
                          • FindClose.KERNEL32(00000000), ref: 00406379
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: XWB
                          • API String ID: 2295610775-4039527733
                          • Opcode ID: 0fc78072580e2aa021d4eb5561dc00c277e918fd128e5e9fad30f275acd9c25d
                          • Instruction ID: b60ab41fd2821b41d0b392bba1ac2053f61c2dcbfada57179e30504603363e2d
                          • Opcode Fuzzy Hash: 0fc78072580e2aa021d4eb5561dc00c277e918fd128e5e9fad30f275acd9c25d
                          • Instruction Fuzzy Hash: BBD0123194C1209FD3401778BD0C88B7B989B553317214B72FD2AF23E0C3388C6586D9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 135 403868-403880 call 4063f5 138 403882-403892 call 405f66 135->138 139 403894-4038cb call 405eec 135->139 147 4038ee-403917 call 403b3e call 405adb 138->147 143 4038e3-4038e9 lstrcatW 139->143 144 4038cd-4038de call 405eec 139->144 143->147 144->143 153 4039a9-4039b1 call 405adb 147->153 154 40391d-403922 147->154 160 4039b3-4039ba call 406041 153->160 161 4039bf-4039e4 LoadImageW 153->161 154->153 155 403928-403950 call 405eec 154->155 155->153 164 403952-403956 155->164 160->161 162 403a65-403a6d call 40140b 161->162 163 4039e6-403a16 RegisterClassW 161->163 177 403a77-403a82 call 403b3e 162->177 178 403a6f-403a72 162->178 166 403b34 163->166 167 403a1c-403a60 SystemParametersInfoW CreateWindowExW 163->167 169 403968-403974 lstrlenW 164->169 170 403958-403965 call 405a00 164->170 175 403b36-403b3d 166->175 167->162 171 403976-403984 lstrcmpiW 169->171 172 40399c-4039a4 call 4059d3 call 40601f 169->172 170->169 171->172 176 403986-403990 GetFileAttributesW 171->176 172->153 181 403992-403994 176->181 182 403996-403997 call 405a1f 176->182 188 403a88-403aa2 ShowWindow call 406389 177->188 189 403b0b-403b13 call 405251 177->189 178->175 181->172 181->182 182->172 196 403aa4-403aa9 call 406389 188->196 197 403aae-403ac0 GetClassInfoW 188->197 194 403b15-403b1b 189->194 195 403b2d-403b2f call 40140b 189->195 194->178 198 403b21-403b28 call 40140b 194->198 195->166 196->197 201 403ac2-403ad2 GetClassInfoW RegisterClassW 197->201 202 403ad8-403b09 DialogBoxParamW call 40140b call 4037b8 197->202 198->178 201->202 202->175
                          APIs
                            • Part of subcall function 004063F5: GetModuleHandleA.KERNEL32(?,?,00000020,004032D6,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00406407
                            • Part of subcall function 004063F5: GetProcAddress.KERNEL32(00000000,?), ref: 00406422
                          • lstrcatW.KERNEL32(1033,00422708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422708,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 004038E9
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\unnauseating\albuestdet,1033,00422708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422708,00000000,00000002,75923420), ref: 00403969
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\unnauseating\albuestdet,1033,00422708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422708,00000000), ref: 0040397C
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403987
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\unnauseating\albuestdet), ref: 004039D0
                            • Part of subcall function 00405F66: wsprintfW.USER32 ref: 00405F73
                          • RegisterClassW.USER32(004281C0), ref: 00403A0D
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A25
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A5A
                          • ShowWindow.USER32(00000005,00000000), ref: 00403A90
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004281C0), ref: 00403ABC
                          • GetClassInfoW.USER32(00000000,RichEdit,004281C0), ref: 00403AC9
                          • RegisterClassW.USER32(004281C0), ref: 00403AD2
                          • DialogBoxParamW.USER32(?,00000000,00403C0B,00000000), ref: 00403AF1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\O0rhQM49FL.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\unnauseating\albuestdet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-2217031736
                          • Opcode ID: db80b2588597b3e26acc2e4c4de499a3f9846f615b8d16b47e4426e139c46013
                          • Instruction ID: 2be98759588b12f3ea5babf1b6ec1a1322f2c31473ef1d4f92accd895ea03b39
                          • Opcode Fuzzy Hash: db80b2588597b3e26acc2e4c4de499a3f9846f615b8d16b47e4426e139c46013
                          • Instruction Fuzzy Hash: C861A670644200BAD220AF669D45F3B3A6CEB84749F80457FF941B22E2CB7C6D01CA7E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 209 402dee-402e3c GetTickCount GetModuleFileNameW call 405bf4 212 402e48-402e76 call 40601f call 405a1f call 40601f GetFileSize 209->212 213 402e3e-402e43 209->213 221 402f63-402f71 call 402d8a 212->221 222 402e7c 212->222 214 403020-403024 213->214 228 402f73-402f76 221->228 229 402fc6-402fcb 221->229 224 402e81-402e98 222->224 226 402e9a 224->226 227 402e9c-402ea5 call 40320c 224->227 226->227 235 402eab-402eb2 227->235 236 402fcd-402fd5 call 402d8a 227->236 231 402f78-402f90 call 403222 call 40320c 228->231 232 402f9a-402fc4 GlobalAlloc call 403222 call 403027 228->232 229->214 231->229 255 402f92-402f98 231->255 232->229 260 402fd7-402fe8 232->260 240 402eb4-402ec8 call 405baf 235->240 241 402f2e-402f32 235->241 236->229 246 402f3c-402f42 240->246 258 402eca-402ed1 240->258 245 402f34-402f3b call 402d8a 241->245 241->246 245->246 251 402f51-402f5b 246->251 252 402f44-402f4e call 4064a6 246->252 251->224 259 402f61 251->259 252->251 255->229 255->232 258->246 264 402ed3-402eda 258->264 259->221 261 402ff0-402ff5 260->261 262 402fea 260->262 265 402ff6-402ffc 261->265 262->261 264->246 266 402edc-402ee3 264->266 265->265 268 402ffe-403019 SetFilePointer call 405baf 265->268 266->246 267 402ee5-402eec 266->267 267->246 269 402eee-402f0e 267->269 272 40301e 268->272 269->229 271 402f14-402f18 269->271 273 402f20-402f28 271->273 274 402f1a-402f1e 271->274 272->214 273->246 275 402f2a-402f2c 273->275 274->259 274->273 275->246
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402DFF
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\O0rhQM49FL.exe,00000400,?,?,00000000,00403504,?), ref: 00402E1B
                            • Part of subcall function 00405BF4: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\O0rhQM49FL.exe,80000000,00000003,?,?,00000000,00403504,?), ref: 00405BF8
                            • Part of subcall function 00405BF4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,00403504,?), ref: 00405C1A
                          • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\O0rhQM49FL.exe,C:\Users\user\Desktop\O0rhQM49FL.exe,80000000,00000003,?,?,00000000,00403504,?), ref: 00402E67
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\O0rhQM49FL.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\O0rhQM49FL.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 4283519449-4126984014
                          • Opcode ID: 5c453212d903dc701faa49355209661bb92ff5e6ac37f0c8ac23110231670f15
                          • Instruction ID: cad0cac5a7d3da6b721da94722abfb33afad8597fd9771d3107dd1117b6c1d4f
                          • Opcode Fuzzy Hash: 5c453212d903dc701faa49355209661bb92ff5e6ac37f0c8ac23110231670f15
                          • Instruction Fuzzy Hash: EA51D471901216ABDB209F64DE89B9E7BB8EB04354F20407BF904F62D1C7BC9D419BAD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 602 401767-40178c call 402bbf call 405a4a 607 401796-4017a8 call 40601f call 4059d3 lstrcatW 602->607 608 40178e-401794 call 40601f 602->608 614 4017ad-4017ae call 4062b3 607->614 608->614 617 4017b3-4017b7 614->617 618 4017b9-4017c3 call 406362 617->618 619 4017ea-4017ed 617->619 626 4017d5-4017e7 618->626 627 4017c5-4017d3 CompareFileTime 618->627 621 4017f5-401811 call 405bf4 619->621 622 4017ef-4017f0 call 405bcf 619->622 629 401813-401816 621->629 630 401885-4018ae call 40517e call 403027 621->630 622->621 626->619 627->626 631 401867-401871 call 40517e 629->631 632 401818-401856 call 40601f * 2 call 406041 call 40601f call 405764 629->632 644 4018b0-4018b4 630->644 645 4018b6-4018c2 SetFileTime 630->645 642 40187a-401880 631->642 632->617 665 40185c-40185d 632->665 646 402a55 642->646 644->645 648 4018c8-4018d3 CloseHandle 644->648 645->648 649 402a57-402a5b 646->649 651 4018d9-4018dc 648->651 652 402a4c-402a4f 648->652 654 4018f1-4018f4 call 406041 651->654 655 4018de-4018ef call 406041 lstrcatW 651->655 652->646 659 4018f9-40228d call 405764 654->659 655->659 659->649 665->642 667 40185f-401860 665->667 667->631
                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes,?,?,00000031), ref: 004017A8
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes,?,?,00000031), ref: 004017CD
                            • Part of subcall function 0040601F: lstrcpynW.KERNEL32(00409300,00409300,00000400,0040331A,00428220,NSIS Error), ref: 0040602C
                            • Part of subcall function 0040517E: lstrlenW.KERNEL32(004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B6
                            • Part of subcall function 0040517E: lstrlenW.KERNEL32(00403160,004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C6
                            • Part of subcall function 0040517E: lstrcatW.KERNEL32(004216E8,00403160,00403160,004216E8,00000000,0040FEC0,00000000), ref: 004051D9
                            • Part of subcall function 0040517E: SetWindowTextW.USER32(004216E8,004216E8), ref: 004051EB
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405211
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040522B
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405239
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nspADFC.tmp$C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll$C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes$Call
                          • API String ID: 1941528284-3038758032
                          • Opcode ID: fa6c9ee85054582e6053dcadd9bdeda21757e8bc23449a0a696a8e9d1f30f139
                          • Instruction ID: e39dfb19bb2720adffc224853af95c022162de9bd11196ce21bc9617d3384428
                          • Opcode Fuzzy Hash: fa6c9ee85054582e6053dcadd9bdeda21757e8bc23449a0a696a8e9d1f30f139
                          • Instruction Fuzzy Hash: 9041D571900515BACF20BFB5CC45DAF3679EF45328B20427BF422B50E2DB3C8A519A6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 668 4025e5-4025fa call 402ba2 671 402600-402607 668->671 672 402a4c-402a4f 668->672 674 402609 671->674 675 40260c-40260f 671->675 673 402a55-402a5b 672->673 674->675 677 402773-40277b 675->677 678 402615-402624 call 405f7f 675->678 677->672 678->677 681 40262a 678->681 682 402630-402634 681->682 683 4026c9-4026cc 682->683 684 40263a-402655 ReadFile 682->684 686 4026e4-4026f4 call 405c77 683->686 687 4026ce-4026d1 683->687 684->677 685 40265b-402660 684->685 685->677 689 402666-402674 685->689 686->677 696 4026f6 686->696 687->686 690 4026d3-4026de call 405cd5 687->690 692 40267a-40268c MultiByteToWideChar 689->692 693 40272f-40273b call 405f66 689->693 690->677 690->686 692->696 697 40268e-402691 692->697 693->673 699 4026f9-4026fc 696->699 700 402693-40269e 697->700 699->693 702 4026fe-402703 699->702 700->699 703 4026a0-4026c5 SetFilePointer MultiByteToWideChar 700->703 704 402740-402744 702->704 705 402705-40270a 702->705 703->700 706 4026c7 703->706 708 402761-40276d SetFilePointer 704->708 709 402746-40274a 704->709 705->704 707 40270c-40271f 705->707 706->696 707->677 712 402721-402727 707->712 708->677 710 402752-40275f 709->710 711 40274c-402750 709->711 710->677 711->708 711->710 712->682 713 40272d 712->713 713->677
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                            • Part of subcall function 00405CD5: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405CEB
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 54de609a95a039770bb902f2e006f13192118be6fe7c7de42288ab6e45ce79fa
                          • Instruction ID: 56da5788d6d90062f79809d4a3c22d6e203981add65e083e01e3e907f30c056e
                          • Opcode Fuzzy Hash: 54de609a95a039770bb902f2e006f13192118be6fe7c7de42288ab6e45ce79fa
                          • Instruction Fuzzy Hash: 3F512774D0021AAADF209F94CA88AAEB779FF04344F50447BE501F72E0D7B99D429B69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 714 403027-40303e 715 403040 714->715 716 403047-40304f 714->716 715->716 717 403051 716->717 718 403056-40305b 716->718 717->718 719 40306b-403078 call 40320c 718->719 720 40305d-403066 call 403222 718->720 724 4031c3 719->724 725 40307e-403082 719->725 720->719 728 4031c5-4031c6 724->728 726 403088-4030a8 GetTickCount call 406514 725->726 727 4031ac-4031ae 725->727 738 403202 726->738 740 4030ae-4030b6 726->740 729 4031b0-4031b3 727->729 730 4031f7-4031fb 727->730 732 403205-403209 728->732 733 4031b5 729->733 734 4031b8-4031c1 call 40320c 729->734 735 4031c8-4031ce 730->735 736 4031fd 730->736 733->734 734->724 747 4031ff 734->747 741 4031d0 735->741 742 4031d3-4031e1 call 40320c 735->742 736->738 738->732 744 4030b8 740->744 745 4030bb-4030c9 call 40320c 740->745 741->742 742->724 751 4031e3-4031ef call 405ca6 742->751 744->745 745->724 753 4030cf-4030d8 745->753 747->738 756 4031f1-4031f4 751->756 757 4031a8-4031aa 751->757 755 4030de-4030fb call 406534 753->755 760 403101-403118 GetTickCount 755->760 761 4031a4-4031a6 755->761 756->730 757->728 762 403163-403165 760->762 763 40311a-403122 760->763 761->728 766 403167-40316b 762->766 767 403198-40319c 762->767 764 403124-403128 763->764 765 40312a-403160 MulDiv wsprintfW call 40517e 763->765 764->762 764->765 765->762 769 403180-403186 766->769 770 40316d-403172 call 405ca6 766->770 767->740 771 4031a2 767->771 774 40318c-403190 769->774 775 403177-403179 770->775 771->738 774->755 776 403196 774->776 775->757 777 40317b-40317e 775->777 776->738 777->774
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CountTick$wsprintf
                          • String ID: ... %d%%
                          • API String ID: 551687249-2449383134
                          • Opcode ID: cf664cf4806fb32f7aca161fbd37ecbefe006222c1d77f285591627fdb242337
                          • Instruction ID: dc339ecebd5a12fc0f5e273b782e0acc65c92b35cb5ec2ffb99f959b3dc2fe49
                          • Opcode Fuzzy Hash: cf664cf4806fb32f7aca161fbd37ecbefe006222c1d77f285591627fdb242337
                          • Instruction Fuzzy Hash: CC517A71900219ABDB10DF65D904B9F3FA8AF04766F14427BF911BB2C5C7789E408BE9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 778 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 785 4023c7-4023cf 778->785 786 402a4c-402a5b 778->786 787 4023d1-4023de call 402bbf lstrlenW 785->787 788 4023e2-4023e5 785->788 787->788 792 4023f5-4023f8 788->792 793 4023e7-4023f4 call 402ba2 788->793 796 402409-40241d RegSetValueExW 792->796 797 4023fa-402404 call 403027 792->797 793->792 800 402422-4024fc RegCloseKey 796->800 801 40241f 796->801 797->796 800->786 803 40281e-402825 800->803 801->800 803->786
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nspADFC.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                          • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nspADFC.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nspADFC.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CloseCreateValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nspADFC.tmp
                          • API String ID: 1356686001-1858133699
                          • Opcode ID: a5b94808118f4f17083c268eecdd3f8ec9f5fd7bdad50e3ddf4da40a62736a9e
                          • Instruction ID: 7111b63e716528206d7143fef0c5d48aa4ff5df43585b472b347a68cc626e816
                          • Opcode Fuzzy Hash: a5b94808118f4f17083c268eecdd3f8ec9f5fd7bdad50e3ddf4da40a62736a9e
                          • Instruction Fuzzy Hash: 5B11AE71E00108BFEB10EFA4DD89DAE76BCEB04358F10403AF904B21D1D6B85E419628

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 804 40564d-405698 CreateDirectoryW 805 40569a-40569c 804->805 806 40569e-4056ab GetLastError 804->806 807 4056c5-4056c7 805->807 806->807 808 4056ad-4056c1 SetFileSecurityW 806->808 808->805 809 4056c3 GetLastError 808->809 809->807
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00409300,C:\Users\user\AppData\Local\Temp\), ref: 00405690
                          • GetLastError.KERNEL32 ref: 004056A4
                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B9
                          • GetLastError.KERNEL32 ref: 004056C3
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405673
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 3449924974-823278215
                          • Opcode ID: 1b2f11e61ef5d0ea47512485c2032ecfb56833f92387a3fb2d2f530f64b4175b
                          • Instruction ID: d2f3f002a39499475f228c0a6bab6309b881bedc09a5d6a8f103fb05119b383a
                          • Opcode Fuzzy Hash: 1b2f11e61ef5d0ea47512485c2032ecfb56833f92387a3fb2d2f530f64b4175b
                          • Instruction Fuzzy Hash: DE010871D14219EAEF119FA0CD047EFBFB8EB14314F10853AD909B6190E779A604CFAA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 810 402bff-402c28 RegOpenKeyExW 811 402c93-402c97 810->811 812 402c2a-402c35 810->812 813 402c50-402c60 RegEnumKeyW 812->813 814 402c62-402c74 RegCloseKey call 4063f5 813->814 815 402c37-402c3a 813->815 823 402c76-402c85 814->823 824 402c9a-402ca0 814->824 816 402c87-402c8a RegCloseKey 815->816 817 402c3c-402c4e call 402bff 815->817 821 402c90-402c92 816->821 817->813 817->814 821->811 823->811 824->821 825 402ca2-402cb0 RegDeleteKeyW 824->825 825->821 826 402cb2 825->826 826->811
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                          • RegCloseKey.ADVAPI32(?), ref: 00402C65
                          • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumOpen
                          • String ID:
                          • API String ID: 1912718029-0
                          • Opcode ID: 2793c90fd49a5e1b605453f73a61c738209944c63e67e711cf318bb8db1452b8
                          • Instruction ID: 783455ef39ba97bad4d92773a6bd33e03ba47aaf13af7a3f43d32fd345691cd1
                          • Opcode Fuzzy Hash: 2793c90fd49a5e1b605453f73a61c738209944c63e67e711cf318bb8db1452b8
                          • Instruction Fuzzy Hash: 52115971908118FEEF119F90DE8CEAE3B79FB14384F100476FA05A10A0D3B49E52AA69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 828 10001759-10001795 call 10001b18 832 100018a6-100018a8 828->832 833 1000179b-1000179f 828->833 834 100017a1-100017a7 call 10002286 833->834 835 100017a8-100017b5 call 100022d0 833->835 834->835 840 100017e5-100017ec 835->840 841 100017b7-100017bc 835->841 842 1000180c-10001810 840->842 843 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 840->843 844 100017d7-100017da 841->844 845 100017be-100017bf 841->845 846 10001812-1000184c call 100015b4 call 100024a9 842->846 847 1000184e-10001854 call 100024a9 842->847 868 10001855-10001859 843->868 844->840 848 100017dc-100017dd call 10002b5f 844->848 850 100017c1-100017c2 845->850 851 100017c7-100017c8 call 100028a4 845->851 846->868 847->868 862 100017e2 848->862 856 100017c4-100017c5 850->856 857 100017cf-100017d5 call 10002645 850->857 859 100017cd 851->859 856->840 856->851 867 100017e4 857->867 859->862 862->867 867->840 871 10001896-1000189d 868->871 872 1000185b-10001869 call 1000246c 868->872 871->832 875 1000189f-100018a0 GlobalFree 871->875 878 10001881-10001888 872->878 879 1000186b-1000186e 872->879 875->832 878->871 880 1000188a-10001895 call 1000153d 878->880 879->878 881 10001870-10001878 879->881 880->871 881->878 882 1000187a-1000187b FreeLibrary 881->882 882->878
                          APIs
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                          • FreeLibrary.KERNEL32(?), ref: 1000187B
                          • GlobalFree.KERNEL32(00000000), ref: 100018A0
                            • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                            • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                            • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                          • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                          • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                          • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 885 405eec-405f1e RegOpenKeyExW 886 405f60-405f63 885->886 887 405f20-405f3f RegQueryValueExW 885->887 888 405f41-405f45 887->888 889 405f4d 887->889 890 405f50-405f5a RegCloseKey 888->890 891 405f47-405f4b 888->891 889->890 890->886 891->889 891->890
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,0040615F,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F16
                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,0040615F,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F37
                          • RegCloseKey.KERNELBASE(?,?,0040615F,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Call
                          • API String ID: 3677997916-1824292864
                          • Opcode ID: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                          • Instruction ID: c601889377c76b9115debbe7433e53646a10130b96f6f591fa827391142cde11
                          • Opcode Fuzzy Hash: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                          • Instruction Fuzzy Hash: 26010C3255020AEADB218F65ED09E9B3BACEF44350B004026F919D6260D735D964DFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 892 405c23-405c2f 893 405c30-405c64 GetTickCount GetTempFileNameW 892->893 894 405c73-405c75 893->894 895 405c66-405c68 893->895 897 405c6d-405c70 894->897 895->893 896 405c6a 895->896 896->897
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405C41
                          • GetTempFileNameW.KERNELBASE(00409300,?,00000000,?,?,?,00000000,00403268,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 00405C5C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-44229769
                          • Opcode ID: f059ee56c8deccd03f6e154050eb187f2ccb3477461fa331799173a8e43ad9ef
                          • Instruction ID: 4fdac09ee551a982241d11f866b864b283b1b610f450d112551ccb25b2c02e5c
                          • Opcode Fuzzy Hash: f059ee56c8deccd03f6e154050eb187f2ccb3477461fa331799173a8e43ad9ef
                          • Instruction Fuzzy Hash: 0EF03676B04208BFEB108F55DD49E9BB7ADEB95750F10403AF901F7150E6B0AE548758

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 898 406389-4063a9 GetSystemDirectoryW 899 4063ab 898->899 900 4063ad-4063af 898->900 899->900 901 4063c0-4063c2 900->901 902 4063b1-4063ba 900->902 904 4063c3-4063f2 wsprintfW LoadLibraryW 901->904 902->901 903 4063bc-4063be 902->903 903->904
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063A0
                          • wsprintfW.USER32 ref: 004063DB
                          • LoadLibraryW.KERNELBASE(?), ref: 004063EB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll
                          • API String ID: 2200240437-2744773210
                          • Opcode ID: 8eb02a3bbd68b69db90ac38405ec0e3d1a99f1663c9491293569e02019d06da0
                          • Instruction ID: 006adf5c24d44cc190f28e383f23d96ea846dcb1794efbef959ff2cbc64c9496
                          • Opcode Fuzzy Hash: 8eb02a3bbd68b69db90ac38405ec0e3d1a99f1663c9491293569e02019d06da0
                          • Instruction Fuzzy Hash: D6F09030910119EBDB14AB68DD4DEAB366CAB00304F104476A906F21E1E77CEA68CBE9
                          APIs
                            • Part of subcall function 0040517E: lstrlenW.KERNEL32(004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B6
                            • Part of subcall function 0040517E: lstrlenW.KERNEL32(00403160,004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C6
                            • Part of subcall function 0040517E: lstrcatW.KERNEL32(004216E8,00403160,00403160,004216E8,00000000,0040FEC0,00000000), ref: 004051D9
                            • Part of subcall function 0040517E: SetWindowTextW.USER32(004216E8,004216E8), ref: 004051EB
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405211
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040522B
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405239
                            • Part of subcall function 004056FF: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00425710,Error launching installer), ref: 00405728
                            • Part of subcall function 004056FF: CloseHandle.KERNEL32(00409300), ref: 00405735
                          • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                          • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                          • String ID:
                          • API String ID: 3585118688-0
                          • Opcode ID: a1d795c7baf1e7290d110ce85c2d9cf729f4c63947e2ae07be1deb4f77e0bcaf
                          • Instruction ID: f6705c9319aae76dbd7499045e6368890872edf6032e54a723c1862b254634bc
                          • Opcode Fuzzy Hash: a1d795c7baf1e7290d110ce85c2d9cf729f4c63947e2ae07be1deb4f77e0bcaf
                          • Instruction Fuzzy Hash: 7611A131900108EBCF21AFA1CD8499E7AB6EB04314F24407BF601B61E1C7798A819B9D
                          APIs
                            • Part of subcall function 00405A7E: CharNextW.USER32(?,?,00424F10,00409300,00405AF2,00424F10,00424F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405830,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 00405A8C
                            • Part of subcall function 00405A7E: CharNextW.USER32(00000000), ref: 00405A91
                            • Part of subcall function 00405A7E: CharNextW.USER32(00000000), ref: 00405AA9
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                            • Part of subcall function 0040564D: CreateDirectoryW.KERNELBASE(?,00409300,C:\Users\user\AppData\Local\Temp\), ref: 00405690
                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes,?,00000000,000000F0), ref: 00401645
                          Strings
                          • C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes, xrefs: 00401638
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID: C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes
                          • API String ID: 1892508949-4046994639
                          • Opcode ID: dd004403bb78615ebe310ef398b070af55ffdf45b6279b398ddf670e6eb8005a
                          • Instruction ID: 9984d83288963ddb5bfb53596c8c9f6ed7fbdeacdcadece23b283b8c4b9f7bd6
                          • Opcode Fuzzy Hash: dd004403bb78615ebe310ef398b070af55ffdf45b6279b398ddf670e6eb8005a
                          • Instruction Fuzzy Hash: 70119331504505EBCF206FA48D4199F3AB1EF44368B24097BEA05B61F2D63A4A819E5E
                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00425710,Error launching installer), ref: 00405728
                          • CloseHandle.KERNEL32(00409300), ref: 00405735
                          Strings
                          • Error launching installer, xrefs: 00405712
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: b8225b8e790b3fd0efe802e75bacfbac7fa780f619c07fe13b6fa50099ed031b
                          • Instruction ID: 0e3d6bea0253e84bb75e95f5fd13ebb7f1c25267a9e23a2e11a0c59c818b3a51
                          • Opcode Fuzzy Hash: b8225b8e790b3fd0efe802e75bacfbac7fa780f619c07fe13b6fa50099ed031b
                          • Instruction Fuzzy Hash: A1E0BFB4A50209BFEB10AB64ED45F7B77ADE704604F408521BD10F6190D774A9118A79
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f1b0bcb74e89e0527ce0e7aeb25a080aa3b7917c16b08ac734cf8879bcce8d5f
                          • Instruction ID: 5fe4abb7369df3af91b149f2edb7ea720d50bcc67b973f9abb1089395dd24c70
                          • Opcode Fuzzy Hash: f1b0bcb74e89e0527ce0e7aeb25a080aa3b7917c16b08ac734cf8879bcce8d5f
                          • Instruction Fuzzy Hash: C0A14471E00229CBDF28CFA8C8546ADBBB1FF44305F11856AD956BB281C7785A96CF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4d9f9556e65149fb8038c12abebdeeaff41015fbe822045bf8c0f712664e9a4c
                          • Instruction ID: 7dc68a506d8d0f3fe9b520a6289ddaa7cfd75a66a39107a8603bac83b987cce9
                          • Opcode Fuzzy Hash: 4d9f9556e65149fb8038c12abebdeeaff41015fbe822045bf8c0f712664e9a4c
                          • Instruction Fuzzy Hash: 58912370D00229CBDF28CFA8C854BADBBB1FF44305F15816AD956BB291C7789A96CF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fedee03a87f183305429df1632bc9847bb667c1ae34a6a4f86b425fb5205d62c
                          • Instruction ID: aa61b8b4d6b896fc10b82c5715850ba22d426d73d4dcb40af3c311b95fbd5bbf
                          • Opcode Fuzzy Hash: fedee03a87f183305429df1632bc9847bb667c1ae34a6a4f86b425fb5205d62c
                          • Instruction Fuzzy Hash: 1B815671E00229CFDF24CFA8C844BADBBB1FB44305F25816AD456BB291C7789A96CF54
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e8c959f377d96a3870dba63dd65060f52c5bbf460a72db2a5b2be4756d911549
                          • Instruction ID: 6afa8d85982321809285efd67767f231e28451523f56623c0a237c64ba690010
                          • Opcode Fuzzy Hash: e8c959f377d96a3870dba63dd65060f52c5bbf460a72db2a5b2be4756d911549
                          • Instruction Fuzzy Hash: 7E816731E00229DBDF24CFA9D844BADBBB0FB44305F11816AE856BB2C0C7785A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0a8ee5da33216ad141207925d20784d11e66eebf924bd7a5457e3a8945fa9096
                          • Instruction ID: b0afa4bf9b2f32aef8b418d90c6ac84aec3754d6d6600e102a8a9184c58ea877
                          • Opcode Fuzzy Hash: 0a8ee5da33216ad141207925d20784d11e66eebf924bd7a5457e3a8945fa9096
                          • Instruction Fuzzy Hash: FD712471E00229DFDF24CFA8C844BADBBB1FB48305F15806AD846BB290C7395996DF54
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 62bad76ded8dc27f8eed87459cf3b90d4506ad753805ad6fcc8c39a10a3f4707
                          • Instruction ID: 02d0d75cb83947f83aad45c50880e4a386b83e744e149296eb7fa161ab999f08
                          • Opcode Fuzzy Hash: 62bad76ded8dc27f8eed87459cf3b90d4506ad753805ad6fcc8c39a10a3f4707
                          • Instruction Fuzzy Hash: 08714671E00219CFDF24CFA8C844BADBBB1FB44305F15806AD856BB290C7385956DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa3d38d161a72bddb6f80e1dac2624ab657c9951173fd352498b2eb393463e7a
                          • Instruction ID: eb15c3353e008649bdc799d0a197d89dfb60748dd6a42a5e4cae05a50034cddc
                          • Opcode Fuzzy Hash: aa3d38d161a72bddb6f80e1dac2624ab657c9951173fd352498b2eb393463e7a
                          • Instruction Fuzzy Hash: 67714571E00229DBDF28CF98C844BADBBB1FF44305F11806AD956BB291C7789A66DF44
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                            • Part of subcall function 0040517E: lstrlenW.KERNEL32(004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B6
                            • Part of subcall function 0040517E: lstrlenW.KERNEL32(00403160,004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C6
                            • Part of subcall function 0040517E: lstrcatW.KERNEL32(004216E8,00403160,00403160,004216E8,00000000,0040FEC0,00000000), ref: 004051D9
                            • Part of subcall function 0040517E: SetWindowTextW.USER32(004216E8,004216E8), ref: 004051EB
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405211
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040522B
                            • Part of subcall function 0040517E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405239
                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                          • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: 769524c23f991487a21dbaf07a66c829b44ae02e5e1e2e6f5b4f8137b49dd7d9
                          • Instruction ID: 21b843afec6b7294a3944f79e0bc8b5a0bfae5b7739fd4420ef7f1bee797e933
                          • Opcode Fuzzy Hash: 769524c23f991487a21dbaf07a66c829b44ae02e5e1e2e6f5b4f8137b49dd7d9
                          • Instruction Fuzzy Hash: D0219531904219FBCF20AFA5CE48A9E7EB1AF00354F60427BF500B51E1C7B98E81DA5E
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 00401BA7
                          • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$AllocFree
                          • String ID: Call
                          • API String ID: 3394109436-1824292864
                          • Opcode ID: c75ea88796058ca8b22c76bcb72d404b7a86f9b33cc07dbe0f48447b8f38d296
                          • Instruction ID: 6437723b9896d782a6b7fabab6bc3621d1df67fb8e76a078729fc3794235ac76
                          • Opcode Fuzzy Hash: c75ea88796058ca8b22c76bcb72d404b7a86f9b33cc07dbe0f48447b8f38d296
                          • Instruction Fuzzy Hash: 5D219672610102ABCB20EFA4CD8595EB7F5EF44314725403BF606B72D1DB7898519F9D
                          APIs
                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nspADFC.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Enum$CloseOpenValue
                          • String ID:
                          • API String ID: 167947723-0
                          • Opcode ID: e49789553f80df71b5a8f015121ca27de6b49ec1f8e30f59fb023453b2c57a8d
                          • Instruction ID: 9b49ef4685d11130b37b7b0c6276d492a5168a4a944959f4997216c5b5c768b0
                          • Opcode Fuzzy Hash: e49789553f80df71b5a8f015121ca27de6b49ec1f8e30f59fb023453b2c57a8d
                          • Instruction Fuzzy Hash: 1FF06D72A04204BBE7209F659E88ABF766DEF80354B10843AF505B61D0D6B85D419B6A
                          APIs
                          • VirtualAllocEx.KERNELBASE(00000000), ref: 10002963
                          • GetLastError.KERNEL32 ref: 10002A6A
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: AllocErrorLastVirtual
                          • String ID:
                          • API String ID: 497505419-0
                          • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                          • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                          • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                          • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 1f472dfcc894d90b0504cb8d955b7f6dcf6f20f1f7a064cd725307f95b817da4
                          • Instruction ID: 1e7952006d9e226a8eb598a62733b1cad305e59e596fc6f41a9a7203fe322f79
                          • Opcode Fuzzy Hash: 1f472dfcc894d90b0504cb8d955b7f6dcf6f20f1f7a064cd725307f95b817da4
                          • Instruction Fuzzy Hash: 9401D131B24210EBE7295B389C05B6A3698E720318F10867EB915F62F1DA78DC028B5D
                          APIs
                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CloseDeleteOpenValue
                          • String ID:
                          • API String ID: 849931509-0
                          • Opcode ID: 919bd9bebb28b867b108a6c090497660be6b9070bc2bab02d356dbee2d95b006
                          • Instruction ID: 78bc400ea2c38a342dc409f04ff34772de2348df94907e049583a87c4894aa7b
                          • Opcode Fuzzy Hash: 919bd9bebb28b867b108a6c090497660be6b9070bc2bab02d356dbee2d95b006
                          • Instruction Fuzzy Hash: F2F0AF33A04100ABEB10BFB48A4EABE72699B40314F14843BF501B71D1C9FC9D025629
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,00000020,004032D6,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00406407
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406422
                            • Part of subcall function 00406389: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063A0
                            • Part of subcall function 00406389: wsprintfW.USER32 ref: 004063DB
                            • Part of subcall function 00406389: LoadLibraryW.KERNELBASE(?), ref: 004063EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: d7ac541ed48af1eacb80342b8b251201fb822529d60d72dade8e8733a6d6c095
                          • Instruction ID: a9e24e321ddd3f073a9e6a165911cd393abac726806fbc755e3780b1e63cb1a6
                          • Opcode Fuzzy Hash: d7ac541ed48af1eacb80342b8b251201fb822529d60d72dade8e8733a6d6c095
                          • Instruction Fuzzy Hash: A7E086326082216BD31157745D4493B67A89BD5740306083EFD06F6181D734AC2296AD
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\O0rhQM49FL.exe,80000000,00000003,?,?,00000000,00403504,?), ref: 00405BF8
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,00403504,?), ref: 00405C1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                          • Instruction ID: be88a92cb82447fd1599dbd49a9896cb6db060ceaa3ec03b2970cb079924df1d
                          • Opcode Fuzzy Hash: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                          • Instruction Fuzzy Hash: FDD09E71658201AFEF098F20DE16F2E7AA2EB84B00F10562CB642940E0D6B15815DB16
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,0040325D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 004056D0
                          • GetLastError.KERNEL32 ref: 004056DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                          • Instruction ID: d706e5ae47c7ee36432b9320fd90c1f42ce8b6abbc3a43a90ad219fc8104f268
                          • Opcode Fuzzy Hash: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                          • Instruction Fuzzy Hash: 5DC04C30A19602DBDA105B31DD0871B7954AB50742F60CD36610AE51A0DA769811DD3E
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                            • Part of subcall function 00405F66: wsprintfW.USER32 ref: 00405F73
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: 64c495f6a90fc039130ad8c13d00fda46c397e26af27c45f3e8a2568f411c02f
                          • Instruction ID: 1ea0f4fe546ff0a6cc1a224cb0175f0568d280dd86a823eff906e537ce259dc5
                          • Opcode Fuzzy Hash: 64c495f6a90fc039130ad8c13d00fda46c397e26af27c45f3e8a2568f411c02f
                          • Instruction Fuzzy Hash: DBE01A72A05514ABDB11AFA59E4ACAF766AEB40328B14443BF105F00E1C67D8D019A2E
                          APIs
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: 0286e3c2219f2336aac24a8adfc5af7a950c5186903a8fadcfb356e78ce5c9c9
                          • Instruction ID: 900e0ed31166daec82b0b067df29ce1ac5916d1a5491b2584b310d9ae4f56f06
                          • Opcode Fuzzy Hash: 0286e3c2219f2336aac24a8adfc5af7a950c5186903a8fadcfb356e78ce5c9c9
                          • Instruction Fuzzy Hash: 5BE04F319001246ADB113EF10E8ED7F31695B40314B1405BFB511B66C6D5FC1D4146A9
                          APIs
                          • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401741
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: PathSearch
                          • String ID:
                          • API String ID: 2203818243-0
                          • Opcode ID: 81b4f86a52adf68e4702c4bb0bdf75428b0e0818ea45aab8824d6c610dacd1e5
                          • Instruction ID: 0851ebd2278d1e7daa5b6d30d0a19f3cab84c03b6f2ce2edda3e72f353adab80
                          • Opcode Fuzzy Hash: 81b4f86a52adf68e4702c4bb0bdf75428b0e0818ea45aab8824d6c610dacd1e5
                          • Instruction Fuzzy Hash: DAE04F72304100ABD710CFA4DE49AAA77ACDB403A8F20457BE615A61D1E6B49A41972D
                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040321F,00000000,00000000,00403076,000000FF,00000004,00000000,00000000,00000000), ref: 00405C8B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                          • Instruction ID: b406f17295b0c4e2c80a39b4892fee2aa768816fba0af151b3e099c9f54450aa
                          • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                          • Instruction Fuzzy Hash: 3BE08632114259ABDF119E508C04EEB3B5CEB04350F004436F911E3180D230E9209BA4
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: dee534fb00c3da35f42930a873cbe089bc3ca12b7b75b89d27cc42400959d1ef
                          • Instruction ID: 68f4dbfd07ce8b2f927ba9c023ef299b46c4db6be22e7618382101f0868acce4
                          • Opcode Fuzzy Hash: dee534fb00c3da35f42930a873cbe089bc3ca12b7b75b89d27cc42400959d1ef
                          • Instruction Fuzzy Hash: CCE04F76254108BADB00DFA4DD46EA577ECAB04700F004421BA08D60A1C674E5408768
                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004031ED,00000000,0040BEC0,?,0040BEC0,?,000000FF,00000004,00000000), ref: 00405CBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                          • Instruction ID: 8766ac6266e8b07294e6d952513c2b0c694ccf73d68c0bd44325f5ff4784c02c
                          • Opcode Fuzzy Hash: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                          • Instruction Fuzzy Hash: D4E08C3222835AABEF119E548C00EEB3B6CEB01360F004833F915E3190E231E9209BA8
                          APIs
                          • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                          • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 3e803e02f74c9f88bb83833f4ed5a4af44336c5c42e2fc377601f2590f6e6eb6
                          • Instruction ID: 1b5af1e6617a4a9cd807fc22027cae36a39ca3b3e6b8606dbe65da2ef404c620
                          • Opcode Fuzzy Hash: 3e803e02f74c9f88bb83833f4ed5a4af44336c5c42e2fc377601f2590f6e6eb6
                          • Instruction Fuzzy Hash: 41D01233B04100DBCB10DFA89A0869D77659B40334B208677D501F21E5D6B9C5515A19
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,00403504,?), ref: 00403230
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                          • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                          • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                          • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014E6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 70669ac5e73c5e0fd120337f743f0ec3388cc295a7de1ade3031c69f4afd3847
                          • Instruction ID: 97e26b744c28169e8b025be137c519adc4d29a227e598783c976d4988d520b86
                          • Opcode Fuzzy Hash: 70669ac5e73c5e0fd120337f743f0ec3388cc295a7de1ade3031c69f4afd3847
                          • Instruction Fuzzy Hash: 47D0C977B14100ABD720EFB9AE898AB73ACEB513293204833D902E10A2D579D802866D
                          APIs
                          • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                          • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                          • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                          • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 0040531B
                          • GetDlgItem.USER32(?,000003EE), ref: 0040532A
                          • GetClientRect.USER32(?,?), ref: 00405367
                          • GetSystemMetrics.USER32(00000002), ref: 0040536E
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538F
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053A0
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053B3
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053C1
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053D4
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F6
                          • ShowWindow.USER32(?,00000008), ref: 0040540A
                          • GetDlgItem.USER32(?,000003EC), ref: 0040542B
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040543B
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405454
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405460
                          • GetDlgItem.USER32(?,000003F8), ref: 00405339
                            • Part of subcall function 00404118: SendMessageW.USER32(00000028,?,00000001,00403F44), ref: 00404126
                          • GetDlgItem.USER32(?,000003EC), ref: 0040547D
                          • CreateThread.KERNEL32(00000000,00000000,Function_00005251,00000000), ref: 0040548B
                          • CloseHandle.KERNEL32(00000000), ref: 00405492
                          • ShowWindow.USER32(00000000), ref: 004054B6
                          • ShowWindow.USER32(?,00000008), ref: 004054BB
                          • ShowWindow.USER32(00000008), ref: 00405505
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405539
                          • CreatePopupMenu.USER32 ref: 0040554A
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040555E
                          • GetWindowRect.USER32(?,?), ref: 0040557E
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405597
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CF
                          • OpenClipboard.USER32(00000000), ref: 004055DF
                          • EmptyClipboard.USER32 ref: 004055E5
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055F1
                          • GlobalLock.KERNEL32(00000000), ref: 004055FB
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560F
                          • GlobalUnlock.KERNEL32(00000000), ref: 0040562F
                          • SetClipboardData.USER32(0000000D,00000000), ref: 0040563A
                          • CloseClipboard.USER32 ref: 00405640
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: {
                          • API String ID: 590372296-366298937
                          • Opcode ID: da2ca2b418a71cb7626a400892366c561e1cdf4532a0086df1c8728d7d787aa1
                          • Instruction ID: 3cf410e3b9716a944c4f9a47a0d896a4f96f7db2f8ccf501d1eae2c46102dad2
                          • Opcode Fuzzy Hash: da2ca2b418a71cb7626a400892366c561e1cdf4532a0086df1c8728d7d787aa1
                          • Instruction Fuzzy Hash: 85B13A71900208FFDB21AF60DD85AAE7B79FB44355F40803AFA01BA1A0C7755E52DF69
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404B12
                          • GetDlgItem.USER32(?,00000408), ref: 00404B1D
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B67
                          • LoadBitmapW.USER32(0000006E), ref: 00404B7A
                          • SetWindowLongW.USER32(?,000000FC,004050F2), ref: 00404B93
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA7
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB9
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCF
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BDB
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BED
                          • DeleteObject.GDI32(00000000), ref: 00404BF0
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C1B
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C27
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CBD
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE8
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CFC
                          • GetWindowLongW.USER32(?,000000F0), ref: 00404D2B
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D39
                          • ShowWindow.USER32(?,00000005), ref: 00404D4A
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E47
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EAC
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EC1
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE5
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F05
                          • ImageList_Destroy.COMCTL32(?), ref: 00404F1A
                          • GlobalFree.KERNEL32(?), ref: 00404F2A
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FA3
                          • SendMessageW.USER32(?,00001102,?,?), ref: 0040504C
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040505B
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0040507B
                          • ShowWindow.USER32(?,00000000), ref: 004050C9
                          • GetDlgItem.USER32(?,000003FE), ref: 004050D4
                          • ShowWindow.USER32(00000000), ref: 004050DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: 00f807dd19097039cdfae8d42ef0864fc158edb6895af2579c06ee0ad68b6d60
                          • Instruction ID: d9c0fbcad293e7aaadacffa1f228c55c0cff6ebba89157b443eef3cf19c2f35f
                          • Opcode Fuzzy Hash: 00f807dd19097039cdfae8d42ef0864fc158edb6895af2579c06ee0ad68b6d60
                          • Instruction Fuzzy Hash: AF026FB0A00209EFDB209F54DD85AAE7BB5FB84314F10857AF610BA2E1D7799D42CF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 004045CD
                          • SetWindowTextW.USER32(00000000,?), ref: 004045F7
                          • SHBrowseForFolderW.SHELL32(?), ref: 004046A8
                          • CoTaskMemFree.OLE32(00000000), ref: 004046B3
                          • lstrcmpiW.KERNEL32(Call,00422708,00000000,?,?), ref: 004046E5
                          • lstrcatW.KERNEL32(?,Call), ref: 004046F1
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404703
                            • Part of subcall function 00405748: GetDlgItemTextW.USER32(?,?,00000400,0040473A), ref: 0040575B
                            • Part of subcall function 004062B3: CharNextW.USER32(00409300,*?|<>/":,00000000,"C:\Users\user\Desktop\O0rhQM49FL.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 00406316
                            • Part of subcall function 004062B3: CharNextW.USER32(00409300,00409300,00409300,00000000), ref: 00406325
                            • Part of subcall function 004062B3: CharNextW.USER32(00409300,"C:\Users\user\Desktop\O0rhQM49FL.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 0040632A
                            • Part of subcall function 004062B3: CharPrevW.USER32(00409300,00409300,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 0040633D
                          • GetDiskFreeSpaceW.KERNEL32(004206D8,?,?,0000040F,?,004206D8,004206D8,?,00000001,004206D8,?,?,000003FB,?), ref: 004047C6
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047E1
                            • Part of subcall function 0040493A: lstrlenW.KERNEL32(00422708,00422708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049DB
                            • Part of subcall function 0040493A: wsprintfW.USER32 ref: 004049E4
                            • Part of subcall function 0040493A: SetDlgItemTextW.USER32(?,00422708), ref: 004049F7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\AppData\Roaming\unnauseating\albuestdet$Call
                          • API String ID: 2624150263-277393394
                          • Opcode ID: 9fff75d44962757429dc3e2902d1974289698b17ee3baa263f594784ad652460
                          • Instruction ID: 5fc8bddc00f1cc174a6dc329f65f284a7a254117467b0892f0b405221262b822
                          • Opcode Fuzzy Hash: 9fff75d44962757429dc3e2902d1974289698b17ee3baa263f594784ad652460
                          • Instruction Fuzzy Hash: D9A150B1D00209ABDB11AFA5CC85AAF77B8EF84315F11843BF611B72D1D77C8A418B69
                          APIs
                          • CoCreateInstance.OLE32(0040749C,?,00000001,0040748C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                          Strings
                          • C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes, xrefs: 00402154
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\AppData\Roaming\unnauseating\albuestdet\Programspecifikationenernes
                          • API String ID: 542301482-4046994639
                          • Opcode ID: f6c9e515521f1fa62750a1a75da94e91cc5d062543102a3a6cbb304dea821779
                          • Instruction ID: 6cbe38940624da38e40774ab578681f1f604b85ca8fb8198b005fe2b44c0e728
                          • Opcode Fuzzy Hash: f6c9e515521f1fa62750a1a75da94e91cc5d062543102a3a6cbb304dea821779
                          • Instruction Fuzzy Hash: A7411D75A00208AFCF00DFA4CD889AD7BB5FF48314B20457AF515EB2D1D7799A41CB55
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 969cbda3b3cfe11703c14b4ce8f4b9b3fb4feaebf9848e8514cb89d3c6c7a4d8
                          • Instruction ID: 5886dfe4bc611d4993f15ed40ae28ce81127269af5662ddb55851ccd49cbf6f1
                          • Opcode Fuzzy Hash: 969cbda3b3cfe11703c14b4ce8f4b9b3fb4feaebf9848e8514cb89d3c6c7a4d8
                          • Instruction Fuzzy Hash: 10F05E71A00115ABC711EFA4DD49AAEB378FF04324F1005BBF105E21E1D6B89A409B29
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C47
                          • ShowWindow.USER32(?), ref: 00403C64
                          • DestroyWindow.USER32 ref: 00403C78
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C94
                          • GetDlgItem.USER32(?,?), ref: 00403CB5
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC9
                          • IsWindowEnabled.USER32(00000000), ref: 00403CD0
                          • GetDlgItem.USER32(?,00000001), ref: 00403D7E
                          • GetDlgItem.USER32(?,00000002), ref: 00403D88
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403DA2
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403DF3
                          • GetDlgItem.USER32(?,00000003), ref: 00403E99
                          • ShowWindow.USER32(00000000,?), ref: 00403EBA
                          • EnableWindow.USER32(?,?), ref: 00403ECC
                          • EnableWindow.USER32(?,?), ref: 00403EE7
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EFD
                          • EnableMenuItem.USER32(00000000), ref: 00403F04
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F1C
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2F
                          • lstrlenW.KERNEL32(00422708,?,00422708,00428220), ref: 00403F58
                          • SetWindowTextW.USER32(?,00422708), ref: 00403F6C
                          • ShowWindow.USER32(?,0000000A), ref: 004040A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                          • String ID:
                          • API String ID: 184305955-0
                          • Opcode ID: 18a99261430c4225635231928db8a64f2f43d3b33d48ccba4c43f88b8e0e4f23
                          • Instruction ID: 61cac7681639d4f9e887145b94be1570fe16d39d0a036e069046cfcd2a92ab20
                          • Opcode Fuzzy Hash: 18a99261430c4225635231928db8a64f2f43d3b33d48ccba4c43f88b8e0e4f23
                          • Instruction Fuzzy Hash: 3BC1C071A04200BBDB316F61ED84E2B3AACEB95705F50053EF601B11F1CB799992DB6E
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040431E
                          • GetDlgItem.USER32(?,000003E8), ref: 00404332
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040434F
                          • GetSysColor.USER32(?), ref: 00404360
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040436E
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040437C
                          • lstrlenW.KERNEL32(?), ref: 00404381
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040438E
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043A3
                          • GetDlgItem.USER32(?,0000040A), ref: 004043FC
                          • SendMessageW.USER32(00000000), ref: 00404403
                          • GetDlgItem.USER32(?,000003E8), ref: 0040442E
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404471
                          • LoadCursorW.USER32(00000000,00007F02), ref: 0040447F
                          • SetCursor.USER32(00000000), ref: 00404482
                          • ShellExecuteW.SHELL32(0000070B,open,004271C0,00000000,00000000,00000001), ref: 00404497
                          • LoadCursorW.USER32(00000000,00007F00), ref: 004044A3
                          • SetCursor.USER32(00000000), ref: 004044A6
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 004044D5
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                          • String ID: Call$N$open
                          • API String ID: 3615053054-2563687911
                          • Opcode ID: 2c4f6cf5a4aa9f0210a02c82683795d0b5a579b88aa58951f10bca9314f1fa64
                          • Instruction ID: 4b5324550c8b175de7ac8ee9e9744dd98fad869a56f6e91fb07d2f074fcd5292
                          • Opcode Fuzzy Hash: 2c4f6cf5a4aa9f0210a02c82683795d0b5a579b88aa58951f10bca9314f1fa64
                          • Instruction Fuzzy Hash: F87172B1A00209BFDB109F60DD85E6A7B69FB84354F00853AF705B62E1C778AD51CFA9
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00428220,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: 6e8d97c549c1634dd7cb3ad4fe557c39b8a0e77cc2ec0408d7783d5d6495b6da
                          • Instruction ID: b0ee482b8836f8c5ddb0523b9b95fc6b4c0959077eeb464a3039c1fdf8a9f2d7
                          • Opcode Fuzzy Hash: 6e8d97c549c1634dd7cb3ad4fe557c39b8a0e77cc2ec0408d7783d5d6495b6da
                          • Instruction Fuzzy Hash: F6418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF951AA1A0C738EA51DFA5
                          APIs
                          • lstrcpyW.KERNEL32(00425DA8,NUL,?,00000000,?,00409300,00405EE1,?,?), ref: 00405D5D
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00409300,00405EE1,?,?), ref: 00405D81
                          • GetShortPathNameW.KERNEL32(?,00425DA8,00000400), ref: 00405D8A
                            • Part of subcall function 00405B59: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E3A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B69
                            • Part of subcall function 00405B59: lstrlenA.KERNEL32(00000000,?,00000000,00405E3A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9B
                          • GetShortPathNameW.KERNEL32(004265A8,004265A8,00000400), ref: 00405DA7
                          • wsprintfA.USER32 ref: 00405DC5
                          • GetFileSize.KERNEL32(00000000,00000000,004265A8,C0000000,00000004,004265A8,?,?,?,?,?), ref: 00405E00
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0F
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E47
                          • SetFilePointer.KERNEL32(00409578,00000000,00000000,00000000,00000000,004259A8,00000000,-0000000A,00409578,00000000,[Rename],00000000,00000000,00000000), ref: 00405E9D
                          • GlobalFree.KERNEL32(00000000), ref: 00405EAE
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB5
                            • Part of subcall function 00405BF4: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\O0rhQM49FL.exe,80000000,00000003,?,?,00000000,00403504,?), ref: 00405BF8
                            • Part of subcall function 00405BF4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,00403504,?), ref: 00405C1A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                          • String ID: %ls=%ls$NUL$[Rename]
                          • API String ID: 222337774-899692902
                          • Opcode ID: e80570f2f8cd2c9f135b21ee9e2312080ea8554e7c88b9adf45b38d7f754558e
                          • Instruction ID: 907d7383bdf99192a2874dfd68d01e77647b980fe5b363d6f0c9d0989479472f
                          • Opcode Fuzzy Hash: e80570f2f8cd2c9f135b21ee9e2312080ea8554e7c88b9adf45b38d7f754558e
                          • Instruction Fuzzy Hash: 88311F71A05B14BBD6206B229C48F6B3A6CDF45755F14043ABE41F62D2DA3CEE018AFD
                          APIs
                          • CharNextW.USER32(00409300,*?|<>/":,00000000,"C:\Users\user\Desktop\O0rhQM49FL.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 00406316
                          • CharNextW.USER32(00409300,00409300,00409300,00000000), ref: 00406325
                          • CharNextW.USER32(00409300,"C:\Users\user\Desktop\O0rhQM49FL.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 0040632A
                          • CharPrevW.USER32(00409300,00409300,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 0040633D
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004062B4
                          • "C:\Users\user\Desktop\O0rhQM49FL.exe", xrefs: 004062F7
                          • *?|<>/":, xrefs: 00406305
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\O0rhQM49FL.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-3553065198
                          • Opcode ID: 6a1238fba9ba947ddf3d1c913c8afd34c4b382e8901ee0696378a8a11e3e1ee4
                          • Instruction ID: 54bf27a4ef4c29ba7f7e7f80dc621db20ebbd613429789f6f10e18307ece98db
                          • Opcode Fuzzy Hash: 6a1238fba9ba947ddf3d1c913c8afd34c4b382e8901ee0696378a8a11e3e1ee4
                          • Instruction Fuzzy Hash: B711946A80021295EB313B198C40AB7B6F8EF59750F56417FED86B32C0E77C5C9286ED
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 00404167
                          • GetSysColor.USER32(00000000), ref: 00404183
                          • SetTextColor.GDI32(?,00000000), ref: 0040418F
                          • SetBkMode.GDI32(?,?), ref: 0040419B
                          • GetSysColor.USER32(?), ref: 004041AE
                          • SetBkColor.GDI32(?,?), ref: 004041BE
                          • DeleteObject.GDI32(?), ref: 004041D8
                          • CreateBrushIndirect.GDI32(?), ref: 004041E2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: bdecbf54746ac4e95bafbcd3f7306951f606de83f5b9b49a03f8dc0a3bab15ec
                          • Instruction ID: 457b5273a6ad35ed29f896ddd043663fa6b3a1b95e22c78e57b6691615e2b460
                          • Opcode Fuzzy Hash: bdecbf54746ac4e95bafbcd3f7306951f606de83f5b9b49a03f8dc0a3bab15ec
                          • Instruction Fuzzy Hash: 1921A1B1804704ABCB219F68DD4CB4BBBF8AF40710F048A29ED92E62E0D734E944CB65
                          APIs
                          • lstrlenW.KERNEL32(004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B6
                          • lstrlenW.KERNEL32(00403160,004216E8,00000000,0040FEC0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C6
                          • lstrcatW.KERNEL32(004216E8,00403160,00403160,004216E8,00000000,0040FEC0,00000000), ref: 004051D9
                          • SetWindowTextW.USER32(004216E8,004216E8), ref: 004051EB
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405211
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040522B
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405239
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID:
                          • API String ID: 2531174081-0
                          • Opcode ID: b3b426c8c96c0d6a6cce16e65ff4c744bbf9f5044ab1cc25101196bb62a9e0e5
                          • Instruction ID: 21bddbe199db3e121897d5596c22f00b0e76f5ccd37bc28327e30b1938552548
                          • Opcode Fuzzy Hash: b3b426c8c96c0d6a6cce16e65ff4c744bbf9f5044ab1cc25101196bb62a9e0e5
                          • Instruction Fuzzy Hash: 9E219D71900118BACB219FA5DD84ACFBFB9EF58350F14807AF904B62A0C7798A41CF68
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A63
                          • GetMessagePos.USER32 ref: 00404A6B
                          • ScreenToClient.USER32(?,?), ref: 00404A85
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A97
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404ABD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 8f99d7edcbb1b2af9b03d3486fc4037292eab20d77c75a8c6737f0729fb79e96
                          • Instruction ID: 42cc3fd90da340ed33e1658783c39be2c5e0210da91f3d0a8fd677c6224e58ad
                          • Opcode Fuzzy Hash: 8f99d7edcbb1b2af9b03d3486fc4037292eab20d77c75a8c6737f0729fb79e96
                          • Instruction Fuzzy Hash: 19015E71E40218BADB00DB94DD85FFEBBBCAF54711F10016BBB11B61D0D7B8AA058BA5
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                          • MulDiv.KERNEL32(000B87E4,00000064,000B87E8), ref: 00402D4D
                          • wsprintfW.USER32 ref: 00402D5D
                          • SetWindowTextW.USER32(?,?), ref: 00402D6D
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                          Strings
                          • verifying installer: %d%%, xrefs: 00402D57
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: verifying installer: %d%%
                          • API String ID: 1451636040-82062127
                          • Opcode ID: a68141ec73b2a7b0005fea9bea2e0a343ee18c9164241d5958d7192c74469446
                          • Instruction ID: 02b4a25e1ca2abb3aa07e0940f0a1006ed88c36cf357b8fab3844828eab6b7e4
                          • Opcode Fuzzy Hash: a68141ec73b2a7b0005fea9bea2e0a343ee18c9164241d5958d7192c74469446
                          • Instruction Fuzzy Hash: 3E01F471640209ABEF249F61DD49FEA3B69EB04305F008035FA05A92D1DBB999548F59
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 10002416
                            • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                          • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID:
                          • API String ID: 4216380887-0
                          • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                          • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                          • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                          • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalFree.KERNEL32(?), ref: 10002572
                          • GlobalFree.KERNEL32(00000000), ref: 100025AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                          • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                          • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                          • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                          • GlobalFree.KERNEL32(?), ref: 004028E9
                          • GlobalFree.KERNEL32(00000000), ref: 004028FC
                          • CloseHandle.KERNEL32(?), ref: 00402914
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: 87880a874489fc218ffeed1bb5b7a61d92979f204a9b9b6f840c636aa4f91737
                          • Instruction ID: ec7c0e824f3835a9a78c8c015c1ffbc75d15747d838d6b82ce361eed526a9b83
                          • Opcode Fuzzy Hash: 87880a874489fc218ffeed1bb5b7a61d92979f204a9b9b6f840c636aa4f91737
                          • Instruction Fuzzy Hash: 1B219E72C00118BBCF216FA5CD49D9E7E79EF09324F24027AF520762E1C7796D419BA9
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nspADFC.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nspADFC.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: ByteCharMultiWidelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nspADFC.tmp$C:\Users\user\AppData\Local\Temp\nspADFC.tmp\System.dll
                          • API String ID: 3109718747-2461192793
                          • Opcode ID: 715fabf3e67b8bec35f68e4add7a96e8096e5f07f569c16d6c81191c829a4425
                          • Instruction ID: bfa6d714be92c4527cef4f8895cb5ef110114927b7979418da5827123998f54c
                          • Opcode Fuzzy Hash: 715fabf3e67b8bec35f68e4add7a96e8096e5f07f569c16d6c81191c829a4425
                          • Instruction Fuzzy Hash: AE110A72A41204BEDB10AFB58F4AE9E3669AF54394F20403BF402F61C2D6FC8E41466D
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                          • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                          • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                          • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                          • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                          • GlobalFree.KERNEL32(00000000), ref: 10001642
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                          • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D00
                          • GetClientRect.USER32(00000000,?), ref: 00401D0D
                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                          • DeleteObject.GDI32(00000000), ref: 00401D4B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 2257fd8ab512881f6a75dfd94c1adc6df68088fb9580fd68ddbbd23d113039a2
                          • Instruction ID: fda10597d29eaa6b078217e10feb255e8dba845150ef54d65940bec6a2f4d034
                          • Opcode Fuzzy Hash: 2257fd8ab512881f6a75dfd94c1adc6df68088fb9580fd68ddbbd23d113039a2
                          • Instruction Fuzzy Hash: 3AF0C972A04104AFDB11DBA4EE88CEEBBBDEB48311B104566F602F61A1C675ED418B39
                          APIs
                          • GetDC.USER32(?), ref: 00401D59
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                          • ReleaseDC.USER32(?,00000000), ref: 00401D86
                          • CreateFontIndirectW.GDI32(0040BDD0), ref: 00401DD1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID:
                          • API String ID: 3808545654-0
                          • Opcode ID: 787a0cc1cae73e127cbf34e01b63a76a3b17128f4cf73ed1ac2ca508eda492e0
                          • Instruction ID: f0de02ddeea559f0acc09b7c654b6cc4e6647674a776793065cdf7257ef1e696
                          • Opcode Fuzzy Hash: 787a0cc1cae73e127cbf34e01b63a76a3b17128f4cf73ed1ac2ca508eda492e0
                          • Instruction Fuzzy Hash: FF01A231948244BFE701ABB0AE5EBDA7F74EB65305F004479F551B62E2C77810008B6E
                          APIs
                          • lstrlenW.KERNEL32(00422708,00422708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049DB
                          • wsprintfW.USER32 ref: 004049E4
                          • SetDlgItemTextW.USER32(?,00422708), ref: 004049F7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s
                          • API String ID: 3540041739-3551169577
                          • Opcode ID: d85f7ca716c1f5658b91c6656715b5566f7677be60d31edad64312fde4761ef2
                          • Instruction ID: f455ebafcbecf6c6930287b8ee8bcbe2db44ea01d8d71c40407b913fda14730a
                          • Opcode Fuzzy Hash: d85f7ca716c1f5658b91c6656715b5566f7677be60d31edad64312fde4761ef2
                          • Instruction Fuzzy Hash: D611D87364412867DB10A6BD9C45EAF3288DB85374F250237FA26F61D2DA798C6182D8
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 89185f19cab5c9d2123c9567e553a40f312bc8837cbfc1fecf3123f783c5ad12
                          • Instruction ID: a67f43666b390050b7c93cc16dc22df3288c4645dfbd1c9967af83c22614668d
                          • Opcode Fuzzy Hash: 89185f19cab5c9d2123c9567e553a40f312bc8837cbfc1fecf3123f783c5ad12
                          • Instruction Fuzzy Hash: 7C21B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A409B69
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 004059D9
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403496), ref: 004059E3
                          • lstrcatW.KERNEL32(?,00409014), ref: 004059F5
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004059D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-823278215
                          • Opcode ID: d7e49c6a6175e7957920a8ebfa112e8ed7db4acdde4d4b40ed7b02ca79cf1c4c
                          • Instruction ID: e27ca5b6c843e4ca6b7b7419ee0e736cc2f4fee1b15a20ddc9c218eb8b1253ea
                          • Opcode Fuzzy Hash: d7e49c6a6175e7957920a8ebfa112e8ed7db4acdde4d4b40ed7b02ca79cf1c4c
                          • Instruction Fuzzy Hash: 1DD0A761101930AAC212E7488C00DDF729CAE55345341003BF107B30B1C7781D5287FE
                          APIs
                          • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,00403504,?), ref: 00402D9D
                          • GetTickCount.KERNEL32 ref: 00402DBB
                          • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                          • ShowWindow.USER32(00000000,00000005,?,?,00000000,00403504,?), ref: 00402DE6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                          • String ID:
                          • API String ID: 2102729457-0
                          • Opcode ID: 5b077e3499f9c07bbd95dc59ca3d471d91709291d8f5bd327ee9b7f2041f6974
                          • Instruction ID: e23ac89653febb243e72dcf23735aaa2031a226b5032255065ec6e4c9dbb6a99
                          • Opcode Fuzzy Hash: 5b077e3499f9c07bbd95dc59ca3d471d91709291d8f5bd327ee9b7f2041f6974
                          • Instruction Fuzzy Hash: B3F0F431909220EBC6516B54FD4C9DB7F75FB4571270149B7F001B11E4D7B95C818BAD
                          APIs
                            • Part of subcall function 0040601F: lstrcpynW.KERNEL32(00409300,00409300,00000400,0040331A,00428220,NSIS Error), ref: 0040602C
                            • Part of subcall function 00405A7E: CharNextW.USER32(?,?,00424F10,00409300,00405AF2,00424F10,00424F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405830,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 00405A8C
                            • Part of subcall function 00405A7E: CharNextW.USER32(00000000), ref: 00405A91
                            • Part of subcall function 00405A7E: CharNextW.USER32(00000000), ref: 00405AA9
                          • lstrlenW.KERNEL32(00424F10,00000000,00424F10,00424F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405830,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\O0rhQM49FL.exe"), ref: 00405B34
                          • GetFileAttributesW.KERNEL32(00424F10,00424F10,00424F10,00424F10,00424F10,00424F10,00000000,00424F10,00424F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405830,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405B44
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405ADB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 3248276644-823278215
                          • Opcode ID: 5cd88eb9c331bd035ef3732d22fdb38d6df270911e15b1e56a74679c362f2206
                          • Instruction ID: a8deb24d6afa2735206f329f0351f59021ff10951cf48c606255c952c9ad3203
                          • Opcode Fuzzy Hash: 5cd88eb9c331bd035ef3732d22fdb38d6df270911e15b1e56a74679c362f2206
                          • Instruction Fuzzy Hash: CBF04921304E5215D622323A1C44AAF3554CFC1364705073BB861721E1CB3C9943DE7E
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00405121
                          • CallWindowProcW.USER32(?,?,?,?), ref: 00405172
                            • Part of subcall function 0040412F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404141
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: e363e72c763df8ca6100096d80b3df6051651a231830df88c35e98c850c37b72
                          • Instruction ID: 7511a9737e1ae187a562f2e55163cfa394ea92b9daba136d2a61478abf79871a
                          • Opcode Fuzzy Hash: e363e72c763df8ca6100096d80b3df6051651a231830df88c35e98c850c37b72
                          • Instruction Fuzzy Hash: 41015E71A40709BBDF219F11DD84B6B3626E794754F144136FA017E1D1C3BA8C919E2D
                          APIs
                          • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,004037AB,004035C0,?), ref: 004037ED
                          • GlobalFree.KERNEL32(?), ref: 004037F4
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004037D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-823278215
                          • Opcode ID: b2d9a1ddbba9b9f3ee0b0ea3bd9ee1620ba51efa6b86355baead2e8ed11cdd1d
                          • Instruction ID: 66f8bddb8dfdb1964ca55d912e2b06e4102c5475863404a2afc710826c1672a2
                          • Opcode Fuzzy Hash: b2d9a1ddbba9b9f3ee0b0ea3bd9ee1620ba51efa6b86355baead2e8ed11cdd1d
                          • Instruction Fuzzy Hash: CAE0C2B39051206BC7311F04EC08B1AB7BC7F88B32F05416AE8407B3B087742C528BC9
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\O0rhQM49FL.exe,C:\Users\user\Desktop\O0rhQM49FL.exe,80000000,00000003,?,?,00000000,00403504,?), ref: 00405A25
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\O0rhQM49FL.exe,C:\Users\user\Desktop\O0rhQM49FL.exe,80000000,00000003,?,?,00000000,00403504,?), ref: 00405A35
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-1246513382
                          • Opcode ID: bd96f5d222dd2e219d7186a4e9023239cf4eadd8ba915765e0199ed169867e67
                          • Instruction ID: 5bbf66532c1e6c52d9ac91e78c5b81189c295a76ad9a8eb5813a93f974e07d29
                          • Opcode Fuzzy Hash: bd96f5d222dd2e219d7186a4e9023239cf4eadd8ba915765e0199ed169867e67
                          • Instruction Fuzzy Hash: 95D05EB29109209AD322A708DC419AF73ACEF113407464466F401A31A5D3785D818AAA
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                          • GlobalFree.KERNEL32(00000000), ref: 100011C7
                          • GlobalFree.KERNEL32(00000000), ref: 100011D9
                          • GlobalFree.KERNEL32(?), ref: 10001203
                          Memory Dump Source
                          • Source File: 00000000.00000002.3899959371.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3899942231.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900009924.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3900025482.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                          • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E3A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B69
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B81
                          • CharNextA.USER32(00000000,?,00000000,00405E3A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B92
                          • lstrlenA.KERNEL32(00000000,?,00000000,00405E3A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3894895955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3894881617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894908666.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894920564.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3894999855.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_O0rhQM49FL.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 9427bd3955d590afca056539d981812bc3008f0de5e2293753a1e4334a8e9224
                          • Instruction ID: 1b7cebc677eab2b4d2404c83280ad7709bae0e65096c4b9ca61da70a623928b5
                          • Opcode Fuzzy Hash: 9427bd3955d590afca056539d981812bc3008f0de5e2293753a1e4334a8e9224
                          • Instruction Fuzzy Hash: B9F06231504558AFC7029BA5DD40D9FBBB8EF06250B2540A9E800F7351D674FE019BA9